On 2008-08-01 16:40, Jiri Demel wrote:
> Hi.
>
> One of our users has subscribed to a mailing list all mails from which
> are classified  by ClamAV as "Phishing.Heuristics.Email.SpoofedDomain".
>
> After some googling and experimental changing various parts of the
> mail I discovered that the problem is in html link where
>     href="http://tinyurl.com/626yap";
> but the visible text of the link is "Security Books at Amazon.com".
>
> The link is OK because tinyurl in this case redirects the user to Amazon.com
> to the specific page with security books. But it is recognized as phishing
> by ClamAV.
>
> I understand that the heuristics is based on search for html links
> where the visible and real targets of the link are different.
> It's a nice idea. But with tinyurl.com it is likely to produce
> false positives.
>
> To be precise, I discovered that not all such links are classified
> as phishing. For examle when Amazon.com is replaced by Amazon.cz,
> it is OK. But Amazon.de is again recognized as phishing.
> And Amazon.com. (with a dot after com) is OK.
> Perhaps, there is a list of "sensitive" visible targets?
>
> I don't want to switch all the phishing heuristics off
> because it catches some real phishings and I want them to be caught.
> On the other hand I want the above mentioned mailing list to pass
> through our server.
>
> Is there any possiility to have some sort of a local whitelist
> for the phishing heuristics in ClamAV?
> Or should I try to "solve" it in MimeDefang from which I call ClamAV?
>   

You can create a local.wdb file, and add an entry like:
M:tinyurl.com:amazon.com

But that would allow a phishing site that uses tinyurl to bypass.

> I have reported one of those mails as a false positive. Also, a week ago
> a problem of Phishing.Heuristics.Email.SpoofedDomain was mentioned in this
> list, but the problem remains. So I am trying to find at least a local 
> solution.
>
> Finally, a suggestion for the heuristics in next version of clamav:
> If the real target of the link is tinyurl.com, get the target of
> the redirection from the tinyurl.com server and compare it with
> the visible part of the link. If the redirected url has the same domain
> as the visible link, it is not indication of phishing.

That would seriously slow down clamav, because it would need to make a
TCP connection for each URL
encountered in the email.

Best regards,
--Edwin
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to