David Jones wrote:
First, if anyone from Microsoft is on this list, please setup proper outbound spam filtering, rate limiting, and compromised account detection with locking to prevent junk like this.

I have seen a recent increase in the number of outbound junk and phishing emails that I keep reporting to SpamCop who reports it to Microsoft.

https://pastebin.com/c2c2ETYi

Any ideas other than maintaining a complex regex on body matches?  I have tried this with good success but it's creating a few FPs.  I could limit it to O365 servers but that is a lot these days.

For that particular "class" of spam I add the domain to my local DNSBL (if one is available; about 25% of the ones I see use Hotmail/Yahoo/GMail accounts and don't include a domain in the body), file the message in a content-specific folder, and feed it through the rest of the IP/URI extraction processing and Bayes feeding. That particular domain has already made my local list, and I see it's on uribl.com as well. I've also added rules checking the From: domain against DNSBLs; it seems to have helped some generally.

I've been generating a number of sets of more content-specific rules using the SOUGHT code in the SA source tree, but that set doesn't seem to be consistent enough to generate anything. I intermittently check and (re)write a couple of rules but I don't see enough volume to do more than say "Oh, another one of those" by eye. :/

I've had somewhat better success with hand-maintained rules focusing on their "unsubscribe" phrases, since those have tended to be more consistent, and the same phrases are found in other types of spam.

-kgd

Reply via email to