OK, I managed to clean it up enough and added a fake header so I could run clamscan --debug and it confirmed my suspicions:
> LibClamAV debug: Phishcheck:host:.epl.paypal-communication.com > LibClamAV debug: Phishing: looking up in whitelist: > .epl.paypal-communication.com:.www.paypal.com; host-only:1 > LibClamAV debug: Looking up in regex_list: > epl.paypal-communication.com:www.paypal.com/ > LibClamAV debug: Lookup result: not in regex list > LibClamAV debug: Phishcheck: Phishing scan result: URLs are way too different > LibClamAV debug: found Possibly Unwanted: > Heuristics.Phishing.Email.SpoofedDomain -Al- On Wed, May 31, 2017 at 02:05 AM, outre...@epsilon.com wrote: > > Hi Al, > > Could you please confirm exactly what is the issue you see with the links? As > far as I can see, they use standard link tracking. Here are two examples: > > <a style=3D"font-family:Arial; font-siz= e:13px; color:#009cde; > text-decoration:none; font-weight:bold;" > href=3D"https://epl=2Epaypal-communication=2Ecom/T/v20000015c53387d90b8822cf4bbc782e8/5ac10d12aef141110000021ef3a0bcc3/5ac10d12-aef1-4111-b057-9f4d47f20daa"> > <a href=3D= > "https://epl=2Epaypal-communication=2Ecom/T/v20000015c53387d90b8822cf4bbc782e8/5ac10d12aef141110000021ef3a0bcc2/5ac10d12-aef1-4111-b057-9f4d47f20daa" > = target=3D"_blank"> > > This is an example of their images URL: > <img style=3D"display:block; border= :none;" > src=3D"https://www=2Epaypalobjects=2Ecom/digitalassets/c/EMEA/email/1111_cta_blue_left=2Ejpg" > width=3D"5" height=3D"40" alt=3D""/> > > Many thanks, > > Anne-Sophie > > -----Original Message----- > From: clamav-users [mailto:clamav-users-boun...@lists.clamav.net] On Behalf > Of Al Varnell > Sent: 31 May 2017 09:06 > To: ClamAV users ML <clamav-users@lists.clamav.net> > Subject: Re: [clamav-users] clamav-users Digest, Vol 150, Issue 19 > > Perhaps they feel the burden is on PayPal to remove the obfuscation being > used in their links. > > Might be necessary for PayPal corporate to contact Cisco/Talos/ClamAV > directly to resolve this long standing issue. > > But I am a bit surprised that they haven't commented. > > -Al- > > On Wed, May 31, 2017 at 12:53 AM, Outreach wrote: >> >> Hi, >> >> I did but never heard anything back unfortunately. >> >> We still had a lot of mail blocked on the 29/5 because of this issue. >> >> Is there any other way I can submit the samples than via the website? It >> looks like no-one is following up on this, which is very poor. >> >> Thanks, >> >> Anne-Sophie >> >> -----Original Message----- >> From: clamav-users [mailto:clamav-users-boun...@lists.clamav.net] On >> Behalf Of Al Varnell >> Sent: 31 May 2017 05:05 >> To: ClamAV users ML <clamav-users@lists.clamav.net> >> Cc: cla...@jubileegroup.co.uk; clamav-users@lists.clamav.net >> Subject: Re: [clamav-users] clamav-users Digest, Vol 150, Issue 19 >> >> Did I you ever submit those samples as I recommended. It's unlikely that any >> action will be taken until you do. >> >> Most of the people that participate on this list are users and can't do >> anything but give you advice. >> >> Sent from Janet's iPad >> >> -Al- >> >> On May 19, 2017, at 9:14 AM, "Outreach wrote: >>> Hi Ged, >>> >>> I did read your message. Note that the header that you quote below is not >>> related to my request. I am contacting you regarding the following: >>> >>> IPs: 142.54.244.[96-110] >>> >>> Domains: >>> mail.paypal.at >>> mail.paypal.be >>> mail.paypal.ch >>> mail.paypal.co.il >>> mail.paypal.co.uk >>> mail.paypal.de >>> mail.paypal.dk >>> mail.paypal.es >>> mail.paypal.fr >>> mail.paypal.it >>> mail.paypal.nl >>> mail.paypal.no >>> mail.paypal.pl >>> mail.paypal.se >>> mail.paypal.com >>> >>> Call it "reject", "bounce" or "delivery error" - the bottom line is that >>> legitimate mail from our client (including financial communications from >>> account holders) is not being delivered and wrongly identified as a phish >>> by ClamAv. >>> >>> These emails are authenticated, they come from a well-respected >>> organization - hence there is no reason for them to be rejected with the >>> message "554 Your email was rejected because it contains the >>> Heuristics.Phishing.Email.SpoofedDomain virus" >>> >>> >>> Many thanks, >>> >>> >>> Anne-Sophie Marsh, Sr Email Deliverability Manager EMEA >>> T +44 2086143219 M +44 7469352383 Epsilon, 67 Broad Street, >>> Teddington TW11 8QZ, UK epsilon.com >>> >>> >>> >>> >>> --------------------------------------------------------------------- >>> - >>> >>> Message: 1 >>> Date: Thu, 18 May 2017 17:51:15 +0100 (BST) >>> From: "G.W. Haywood" >>> To: clamav-users@lists.clamav.net >>> Subject: Re: [clamav-users] Mail from Paypal wrongly identified as >>> phishing by ClamAv >>> Message-ID: >>> <alpine.deb.2.11.1705181726340.4...@mail6.jubileegroup.co.uk> >>> Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII >>> >>> Hi there, >>> >>> On Thu, 18 May 2017, Anne-Sophie Marsh wrote: >>> >>>> Mail from our client Paypal is being wrongly flagged as phishing by ClamAv. >>> >>> No surprise there. >>> >>>> We get this type of bounce erros: >>>> 554 Your email was rejected because it contains the >>>> Heuristics.Phishing.Email.SpoofedDomain virus >>> >>> That's not a bounce, it's a reject. >>> >>>> Please make the necessary changes to your product ASAP. >>> >>> Well... the last email I saw from PayPal had this in it, carefully hidden: >>> >>> 8<------------------------------------------------------------------- >>> - >>> -- >>> [lefttrianglebracket] >>> img height="1" >>> width="1" >>> src="https://102.112.2O7.net/b/ss/paypalglobal/1/G.4--NS/123456?pageName=system_email_PP1814" >>> border="0" >>> alt=""/ >>> [righttrianglebracket] >>> 8<------------------------------------------------------------------- >>> - >>> -- >>> >>> The mail did pass our SPF checks on receipt: >>> >>> 8<------------------------------------------------------------------- >>> - >>> -- >>> Received-SPF: pass (mail5: domain of serv...@paypal.co.uk designates >>> 173.0.84.226 as permitted sender) receiver=mail5; >>> client-ip=173.0.84.226; helo=mx0.slc.paypal.com; >>> envelope-from=serv...@paypal.co.uk; >>> x-software=spfmilter 0.98-gwh with libspf2-1.2.9; >>> 8<------------------------------------------------------------------- >>> - >>> -- >>> >>> but then it went in the bin. >>> >>> Admittedly this was quite a while ago; we've been rejecting all mail from >>> PayPal since 2013. All the same, you aren't helping anybody by doing >>> things like that. >>> >>> I don't suppose you'll actually read this. > _______________________________________________ > clamav-users mailing list > clamav-users@lists.clamav.net > http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users > > > Help us build a comprehensive ClamAV guide: > https://github.com/vrtadmin/clamav-faq > > http://www.clamav.net/contact.html#ml -Al- -- Al Varnell Mountain View, CA
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml