I just came across a FP report for a hit from
Heuristics.Phishing.Email.SpoofedDomain.

On checking the message by hand, it no longer triggers this test, either
on my desktop test/dev system running 0.98.4, or on the production
servers running 0.97.6.

Examining the message by hand, the best guess I can make about the
triggering URL is:

<a href="http://ems1.aeroplan.com/a/l.x?redacted";
style="text-decoration:underline; color:#FF5C00;"><font
color="#FF5C00">tdcanadatrust.com/preauthorizedpayments</font></a>

All of the other links point to the same subdomain/host;  most with
non-URI visible text, and the few that show a domain in the visible text
are all aeroplan.com.

I dug into the upstream signature files to see if I could identify the
whitelist/skip entry that is now allowing this legitimate message
through - the only remotely relevant entry seems to be this:

daily.cld:H:tdcanadatrust.com

(Which I can't quite match to the signature-creating docs - H: entries
seem to require an additional field.)

I also noticed that --debug output from clamscan doesn't even seem to
show *any* checking of URIs in the message.  Rescanning an older FP
whitelisted locally showed quite a few URIs checked, so I don't have
this accidentally disabled.

It's good that this FP is no longer happening but I'd like to know for
sure what it fired on in the first place, and what change from upstream
fixed the FP.

-kgd
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml

Reply via email to