Andrew:

Are you up to date with your signatures? Email.Phishing.DblDom-60 was
removed on 4/1/2016.

FYI:

$ echo -n 'Email.Phishing.DblDom-60:4:*:2f2e70617970616c2e636f6d' | sigtool
--decode-sigs
VIRUS NAME: Email.Phishing.DblDom-60
TARGET TYPE: MAIL
OFFSET: *
DECODED SIGNATURE:
/[dot]paypal[dot]com

- Alain

On Sat, Apr 2, 2016 at 3:54 PM, Andrew McGlashan <
andrew.mcglas...@affinityvision.com.au> wrote:

> Hi,
>   --  resend ????? again ???? no help???? ---
>
> 550 This message was detected as possible malware
> (Email.Phishing.DblDom-60).
>
> It is not malware, it is just simple logs of backup processes.
>
>
> I have server log messages coming through that are being rejected as
> having "Email.Phishing.DblDom-60" ....
>
> *** How can I determine what it is that is triggering this claim? ***
>
> Thanks
> AndrewM
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to