it is couple of days that i am getting 1000s (I mean each day arround more
than 300) junk emails almost identical "Microsoft Network Security" all
attached with an .exe file.
Plenty of us are experiencing this flood; it seems to have started on
September 18, at the same time the "Swen" virus appeared.
My breakdown:
40% are about size 157K, and contain the .exe attachment;
40% are about size 144K, and are responses from sites that <think>
they got a similar transmission from me (apparently, the virus fakes
sender addresses);
18% are 40K or less; they are short versions of similar responses
from sites, but do not echo the received attachment;
2% or less are "real" mail.
Picking through 500 messages a day to find the six or seven that are
"real" mail can be tedious. At 56K or less, the time taken to
download all that mail, with attachments, would be a major pain. I
use Pegasus to download the headers (File - Selective Mail Download),
and sort them by size, which allows me to identify and dump most of
the bad stuff. Downloading 500 headers still takes ten minutes or so,
but seems to be a workable approach for me.
I've looked at a few of the 157K messages that contain the virus
attachment. The sender address is faked, of course; and, sadly, the
"path" data seems to be munged, so I can't guess the infected sender
so as to reply with "Hey - you have a problem".
This new one seems to be a serious system problem, so there are likely
persons/agencies chasing it down.
I am using Mailwasher freeware but it looks like it doesnt help.
I blush to admit that I've never got Mailwasher to work for me. For
some reason, repeated attempts have resulted in a response along the
lines that my proxy doesn't work. I wonder; does Mailwasher kill
unwanted traffic at the POP header level? Other filters I have seen
need the whole message to do their job; and that, in turn, starts
using up unacceptable amounts of time at 56K.
--Jim