Email-aware
viruses/malware, like the infamous Melissa, Loveletter, AnnaKournikova
and others, have the ability to spread through email by automating
the infected computer's email client. Mass-mailing behavior describes
a situation when an infection spreads rapidly between clients and
servers in an Exchange environment. Mass-mailing attacks can be
expensive to clean up and cause panic among users.
Trend Micro designed the
scan engine to detect behaviors that mass-mailing attacks usually
demonstrate. The behaviors are recorded in the Virus Pattern file
that is updated using the
Trend
Micro™ ActiveUpdate
Servers.
You can enable IM Security to
take a special action against mass-mailing attacks whenever it detects
a mass-mailing behavior. The action configured for mass-mailing
behavior takes precedence over all other actions. The default action against
mass-mailing attacks is Delete entire message.
For example: You configure IM Security to
quarantine messages when it detects a worm or a Trojan in an email
message. You also enable mass-mailing behavior and set IM Security to delete
all messages that demonstrate mass-mailing behavior. IM Security receives a
message containing a worm such as a variant of MyDoom. This worm
uses its own SMTP engine to send itself to email addresses that
it collects from the infected computer. When IM Security detects the MyDoom
worm and recognizes its mass-mailing behavior, it will delete the
email message containing the worm - as opposed to the quarantine
action for worms that do not show mass-mailing behavior.