Sophos would be able to block a lot of these by simply greylisting all domains that aren't .com, .gov, .net, .biz,or .org. In other words all domains that have more than 4 characters in the domain (jsmith@whatever.XXXX). I was reading an article by a spam specialist that was indicating that these snowshoe campaigns are usually hit and run. So if you greylist them, you temporarily give them a soft fail. If the MTA is legitimate, it will try to resend, otherwise, no harm done, other than delaying the message for a few minutes. Again this would only be for domain extensions past three characters.
Seems to me like that's the way to go for now.
If spammers change their ways again, then simply re-write the algorithm to slow down anybody that is not sending from a popular domain extension.
Sophos would be able to block a lot of these by simply greylisting all domains that aren't .com, .gov, .net, .biz,or .org. In other words all domains that have more than 4 characters in the domain (jsmith@whatever.XXXX). I was reading an article by a spam specialist that was indicating that these snowshoe campaigns are usually hit and run. So if you greylist them, you temporarily give them a soft fail. If the MTA is legitimate, it will try to resend, otherwise, no harm done, other than delaying the message for a few minutes. Again this would only be for domain extensions past three characters.
Seems to me like that's the way to go for now.
If spammers change their ways again, then simply re-write the algorithm to slow down anybody that is not sending from a popular domain extension.