One of the spread methods has to do with retrieving a file called
"readme.eml" from the infected web servers. Adding this to my Cisco
HBAR code red config seems to at least keep my customers from becoming
infected using that method.
class-map match-any http-hacks
.. code red stuff..
match protocol http url "*readme.eml"
Can anyone confirm exactly what filenames the email spread version uses?