Embodiments of the invention provide a method and an apparatus for
detecting and responding to email based propagation of malicious software
(malware) in a trusted network. One embodiment provides a detector decoy
email account to serve as generic bait for malicious software for a
domain within the trusted network. In addition, at least one email
account for the domain within the trusted network is provided as a
detector probe account. In so doing, when the detector decoy email
account receives an email from the detector probe account within the
trusted network a policy based infection response rule is generated.