Paul wrote:
Hi

I have 2 emails which have tripped Heuristics.Phishing.Email.SpoofedDomain (4 times in each email using clamscan -x option)

Is the output from clamscan -x --debug shown below indicate the offending url pair triggering Heuristics.Phishing.Email.SpoofedDomain?

LibClamAV debug: Phishing: looking up in whitelist: .clicktime.symantec.com:.www
.barclays.co.uk; host-only:1

Seems likely; this is exactly the kind of URL mismatch it's intended to trigger on.

I have yet to find a guaranteed consistent way to take these entries and convert them to a local whitelist entry for a local .wdb file, but some variation of one of these should work:

M:clicktime.symantec.com:barclays.co.uk
X:\.clicktime\.symantec\.com:www\.barclays\.co\.uk/

However, locally I've also given up on having this enabled where it's an absolute black/white test; I've disabled it for the main Clam instance, and set up a secondary one with this test and a list of variously risky third-party signatures whose results are scored in SpamAssassin instead.

-kgd
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to