> Hi all, I'm wondering if someone has some ideas to handle bank fraud
> phishing emails, and in particular this one:
>
> https://pastebin.com/wxFtKK16
>
> It doesn't hit bayes99 because we haven't seen one before, and txrep
> subtracts points. It also doesn't hit any blacklists.
>
> Ideas for blocking these, and more general advice for blocking banking
> fraud/phish attacks would be appreciated.
>

You can create custom rules for each bank used by your userbase.

Basically you give penalties for the bank name being used in the From
address. And then you undo these penalties for legitimate bank mails. This
you can do by spf/dkim whitelisting them or by checking the From:addr
domain and DKIM_VALID_AU.

Or you can do something like this:

header      __BENEFIT_FROM From =~ /Benefitwallet/i
describe    __BENEFIT_FROM From name includes Benefitwallet
header      __BENEFIT_PHISHING_BADFROMADDR  From:addr !~ /benefitwallet/
describe    __BENEFIT_PHISHING_BADFROMADDR  The from e-mail address does
not contain benefitwallet

meta        BENEFIT_PHISHING_BADFROM  (__BENEFIT_FROM &&
__BENEFIT_PHISHING_BADFROMADDR)
describe    BENEFIT_PHISHING_BADFROM  Fake Benefitwallet mail
score       BENEFIT_PHISHING_BADFROM  3.5

Above rule assumes the legit domain at least has benefitwallet in it.

Basically it all depends about what you know about the bank and how unique
their name is. The more unique, the easier to give penalties to its usage.
And if you can find out from what domains the bank sends legit mail, you
can do dkim whitelisting or DKIM_VALID_AU checks in your rules.


Reply via email to