[identity profile] jahbulon.livejournal.com posting in [community profile] techrecovery
Don't know if you guys have been hit by this fucker : http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.es@mm.html

Basically it makes the emails look like they're coming from the ISP.

cut for angry sweary ranting

This customer has emailed us three times to ask about the emails. She opens the attachments every single goddamned time, then emails us to ask why a) her account has been closed, b) her password has been changed and c) her (ISP) "user profile" has been changed - because these are the things the emails claims to be occurring.

She also requests a callback every single time. We don't do callbacks on grave plus any issue that can be resolved via email will be - we're not going to waste our time calling someone when they have already read the answer. Here is her latest email. Note the complete lack of connection between separate thoughts in her brain as evidenced by the first two sentences.

I have emailed you about this already and you said that (ISP) never sends
attachments. I am scared this is a farce and if I open the attachment it
will be a virus. Please CALL me I've asked you to do this several times on (number)


DUBBLE YYOO TEE EFF WTF WTF WTF This blows my fucking mind.

"You have said A. I am worried that A. Is A?"
"FUCKING A!!!!"

My response :

As you have been previously advised on multiple occasions, these emails ARE a hoax, the attachments ARE a virus and (ISP) will NEVER send you an attachment. This is not only true for the emails you have already received, but any FURTHER emails you receive. Do not open the attachment and delete the emails immediately.

We operate an inbound contact centre. If you wish to speak to us directly you must call us on (number), yet no further action need be taken by you or us in this instance - simply delete the emails. If you wish you may read about the virus on this page : http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.es@mm.html

Shut the fuck up,

Incredulite

Date: 2005-06-17 06:50 pm (UTC)
From: [identity profile] drquuxum.livejournal.com
This actually makes me thankful for the handful of users of mine that forward such messages for verification with full headers.

Too bad that's a very tiny minority.

Date: 2005-06-17 06:55 pm (UTC)
From: [identity profile] tsutton.livejournal.com
Yeah, we're hit with that too. Thankfully our virus scanner was updated so it blocked all of them before it appeared in their Inbox.

Date: 2005-06-17 07:02 pm (UTC)
From: [identity profile] tsutton.livejournal.com
Yeah? I thought Brightmail would have already blocked it by now!

Date: 2005-06-17 07:05 pm (UTC)
From: [identity profile] infy.livejournal.com
Yeppers, even though we send out notifications each and every time these kinds of things happen, we still get a large number of contacts from people who open the attachments. Idiots. If it looks suspicious, don't open it!

Although, I knew we were going to run into problems the moment someone figured out how to make these and use spell check. Amazing.

I've always wanted to say, "Ma'am, this was actually a test to rate the intelligence of our customer base, and their ability to comprehend basic security and computer best practices. Unfortunately, you failed miserably. Please make sure to completely clean out your desk and turn in your ID badge before the end of the business day. Have a wonderful weekend...buh bye."

You know, we'd save a lot of sanity points if they actually bothered to pre-screen applicants before hiring them, especially seeing as they're not concerned about training them afterwards. Not all of them are stupid, but my head aches from the utterly asinine calls I've taken today.

Date: 2005-06-17 07:07 pm (UTC)
From: [identity profile] dhutch.livejournal.com
So thats the name of the bastard. nasty little bitch isnt it? the come thru with support@ register@ administrator@ . My users got a blanket email from me last week - if you see those coming from our domian - they arent. we have no such addresses. Blocks got put in for em. The fun part now is going trhu headers, and sending requests to the ISP's, or dominas they actualy did come from to track the PC down in thier net if they can.

Date: 2005-06-17 07:07 pm (UTC)
From: [identity profile] linguafranca.livejournal.com
Our customers are getting them, too. I've actually fielded only two or three calls this time. After the last batch, I think they've figured out on their own that this is the same sort of thing. Good for them!

Date: 2005-06-17 07:15 pm (UTC)
From: [identity profile] dhutch.livejournal.com
Ha! One who shares my opinions/views on the creatores of these things I bet. The hell witht he governments prosecuting these morons. Just let a small mob of sysadmins deal with em :-) We're creative enough to get them so that "wishing they were never born" pales by comparison to how badly the'd want off this rock we live on. For example - mix the lemon juice in with some rock salt.

Date: 2005-06-17 07:56 pm (UTC)
From: [identity profile] xdownfornowx.livejournal.com
every one is getting hit with that. thankfully trend micro office scan is updated hourly and is pushed to all the clients here. My CEO was kind enough to test it out last week (after 2 warnings from me about it) when trying to open an attacment from a business we partner with. Score 1 for Trend! I honestly believe that ISPs and e-mail hosters need to do more for scanning viruses before letting this shit go through. I know the products are out there, I've researched them. It would only help them in the end with all the down time they get from support calls and server loads.

Date: 2005-06-17 08:00 pm (UTC)
From: [identity profile] ex-deliveryboy.livejournal.com
awesome icon!

Date: 2005-06-17 08:19 pm (UTC)
From: [identity profile] xdownfornowx.livejournal.com
yeah, but it really isn't though. When I was working/attending RIT (www.rit.edu) ITS cleaned up the network/mail system after we, like every other big network, got hammed by Sasser 2 years ago. Know it is next to impossible to transmit a virus through e-mail. It gets scanned, de-fanged, and a warning is attached to the body of the message if there was a threat. Add to that free A/V from mcafee which is required to be installed and updates with all the windows patches prior to being allowed on the network. All this gets done, the network is happy and safe and over 17,000 users never get adversly affected when there is an outbreak. If colleges can do this there is no reason an isp or mail provider can not.

Date: 2005-06-17 08:32 pm (UTC)
From: [identity profile] xdownfornowx.livejournal.com
fair enough

oh, so you're the one!

Date: 2005-06-17 08:53 pm (UTC)
From: [identity profile] valancy17.livejournal.com
quit filling my inbox with messages warning me that other messages might be spam or viruses! I get too much email as it is!

;-)

Date: 2005-06-17 09:03 pm (UTC)
From: [identity profile] infy.livejournal.com
Don't forget piping in either Barry Manilow music or heavy metal muzak. Really make the bitch suffer.

Date: 2005-06-17 11:18 pm (UTC)
From: [identity profile] k8mnstr.livejournal.com
Okay, I've gotta chime in here. I work for a major web hosting provider and on only one of our many many many mail servers, several hundred thousand e-mail messages get transmitted daily. Now, barring the sheer overhead scanning on this magnitude would cost, you still have to deal with the customers. Example:

Us (a long long time ago): Sorry, we do not offer any message filtering services. Any anti-virus/spam filtering and management is soley the responsibility of the account owner.
Luser: That is bullshit, there is no reason why you can't filter our messages for viruses and spam! (ISP) does.

Us (present day): The message was bounced? In order to prevent this from happening you will need to either add the recipient to your whitelist or lower your filtering setting.
Luser: That is bullshit! You have no right to filter our messages like this. My business relys on e-mail and your company is costing me thousands of dollars. I have my own software that I use and you have no right to deny me my e-mail messages!

Either way, we're fucked. Plus although these messages may appear to be coming from a domain that we host, there is still no guarantee that we are the MTA. So long as e-mail clients still allow users to specifiy who the message is originating from, spoofing will still need to be taken into account. Unfortunately there are still many, many mail servers out there that act as an open relay.

The solution needs to be that people who don't know what the fuck they're doing on a computer should not be permitted within 100 yards of said machinary. I know I can't operate a bulldozer, I'm not about to go play GTA on the construction grounds. *headdesk*

Date: 2005-06-19 12:52 pm (UTC)
From: [identity profile] the-s-guy.livejournal.com
Mmm... I'll admit it's pretty rare that ISP end-users are given direct control of ISP-level filters for their account. Most will either block nothing or block as much as possible, with a handful allowing users to toggle this setting on a web page.

I guess there's not really a major market for a useful user-oriented front end for this stuff. Something that would accept an ISP default set of filters, have some of the settings only editable by the ISP, and make others tweakable by end-users using a couple of toggles (basic interface), a page of sliders (advanced interface) or direct filter regexes (administrative interface).

Note that I never said giving people (at least partial) control over something would stop them whining about it...

Date: 2005-06-20 03:17 pm (UTC)
From: [identity profile] justsomegurl.livejournal.com
I've had users call us to ask about these emails that are in their virus filter labeled as a virus. uhm, it says it is a virus because it IS a virus :) thank you

Profile

techrecovery: (Default)
Elitist Computer Nerd Posse

April 2017

S M T W T F S
      1
2345678
91011121314 15
16171819202122
23242526272829
30      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Mar. 20th, 2026 11:43 am
Powered by Dreamwidth Studios