More “You sent a virus!” garbage going around. It’s gotten to the point where I don’t even look at most delivery failure notices, which means I could easily miss errors about mail I really did send.

I got ticked off enough this time that I wrote back to the return address on the warning, matching the tone and structure of their message as closely as possible:

An invalid virus notice was found in an Email message you sent. Your Email scanner recognized a virus as W32/MyDoom-O but did not take into account the fact that this virus always uses a fake sender address.

Please update your virus scanner or contact your IT support personnel as soon as possible as you are sending bogus virus warnings to third parties whose systems are not infected with the virus. This runs the risk of causing unnecessary concern among the less tech-savvy (and extra calls to tech support about the nonexistant virus they fear they have). I would recommend reading up on the phrase “crying wolf” as well.

I regularly get bogus bounces from clueless virus scanners that don’t realize the sending address is fake 99% of the time, but this takes the cake:

Sometime last night I received three copies of the same notice from some system in Brazil. They had written their virus warning in Microsoft Word, saved it as HTML without cleaning up all the extra junk, and made it the only part of the message… in Base64 encoding!

If you’re going to send any kind of diagnostic notice by email, you want it to be as simple and widely readable as possible. That means plain text (not HTML or Base64, and certainly not both!) It also means if you do want to use HTML, at least clean it up and include a plain-text alternative. For all you know it’s going to be read by some admin logging into a GUIless server through SSH over a modem connection on a hotel phone line!

Here are several humor articles that have been posted to the SpamAssassin discussion list over the past week:

The TechWeb Spin: All spam is true! (Fredric Paul, Internet Week, June 29, 2004): Yes, you read it here: it’s all true! The author explains about all the money he’s gotten from deposed Nigerian dictators, the software discounts, the combined advantages of certain pharmaceuticals and dating services, and more! [Edit: Sadly the article was deleted before the Internet Archive got to it.]

It’s true, I read it on the Net! (author unknown): I remember seeing this way back when, under the title “The Ultimate Chain Letter.” It’s kind of like the parody of the Good Times Virus (remember that one?) in that it combines everything. All the urban legends about stolen kidneys, rats at KFC, needles in pay phones, and satanic business leaders. All the email hoaxes about Bill Gates giving you money and dying kids asking for email. All the typical chain letter threats about not breaking the chain.

Spam is out of this world (Adam Turner, Syndey Morning Herald, April 1, 2004): An April Fools’ piece about the Mars Spirit rover being crippled by spam traffic: “The rover’s limited onboard artificial intelligence was foolish enough to apply for an shonky online marketing diploma. Soon after offers of cheap WD40 and antenna enlargements began clogging the link between Mars and NASA’s Deep Space Network.” It goes on to explain that Beagle was taken down by a Martian Nigerian scam.

Welcome to Spam University: a parody of a school site with ridiculously low entry requirements (At least four years of elementary school, No more than three felony convictions), course descriptions (Harvesting Addresses, Covering Your Tracks, Spamming Ethics – Canceled), alumni testimonials and more!

This morning I recieved both a bogus “Out of Office” reply from someone at Halliburton (presumably from a virus that spoofed my address as the sender) and a new 419 scam variant, this one claiming to be someone in Iraq. (I still think of them as Nigerian scams, but they’ve gone seriously international over the past year or so.) Subject line: “EVERY IMPORTANT” (really!)

Something to consider on those vacation messages: I was just sent some random Halliburton employee’s cell phone number. Not that I have any use for it, but would you hand out your cell number to any random person on the Internet? I know I wouldn’t!

Apparently a security firm has discovered a way to trick Mac OS X into running a trojan horse. The technique involves creating a data file, but embedding a Carbon program in it. (Carbon is a programming interface aimed at making it easy to convert older Mac applications to run on Mac OS X without switching into Classic mode.)

According to Intego, Finder will see only the file type data display a spoofed icon identifying the file as (in their example) an MP3, but actually double-clicking on the file will cause the OS to notice the program code and run it. Their proof-of-concept code runs itself, then opens the file in iTunes in order to avoid looking suspicious.

This is very similar to a (fixed, but still present in a zillion unpatched systems) bug in Internet Explorer for Windows that was exploited by many mass-mailing viruses. In that case, IE would decide whether a file was safe by checking the MIME type sent by the server, then use the file extension to decide how to load the file. Viruses would generate messages embedding supposed MIDI files that Outlook would try to play, but instead of handing it to a MIDI player, it would ask the OS to open the file. Without the MIME info, Windows would see it was a program file and run the virus.

If this is confirmed, it will probably not be a vector for e-mail viruses, because the standard mail and web apps for Mac OS X don’t automatically run things the way Outlook, Outlook Express and Internet Explorer do.

No, the real danger will be viruses that spread through peer-to-peer file sharing networks. Download a supposed MP3 off of Gnutella, open up your music folder, double-click on it, and you’re infected.

Apple has said they “are aware of the potential issue… and are working proactively to investigate it.”

(Why is this news? Because it’s Apple, and because it’s so similar to a popular virus vector in Windows. Exploitable vulnerabilities are found so often in Windows I hardly blink.)

Updated slightly based on some real analysis (see comments).