SM wrote:

One major issue we've been having lately is with phishing emails being targeted at us. They're being sent to us from hacked accounts at other educational institutes. The message usually is about "Your EDU webmail account is expiring. Please send us your username and password to fix it." We've had some users fall for it, then their Exchange account gets turned into a spam machine (sending out usual junk spam as well as the original phishing message.) Because they are coming from legitimate sites, it's been very difficult to block these messages. I've been trying to write phrase rules with common words used in the message, but whoever's responsible for this is continually changing the message to prevent you from being able to catch them with phrase rules. Any thoughts?

There was a project from an educational institution to target phishing emails. I don't recall the name of the project or whether the source code was released.

It's called Kochi. I wrote it for Loughborough University. The source code was released under the GPL. Read this:

https://secure.grepular.com/blog/index.php/2009/04/08/mitigating-spear-phishing/

If a phishing email gets through, and one of our staff or students replies to it, Kochi will detect the username/password in the email and block it from getting out. Kochi pulls out all of the possible username/password combinations from the email and does authentication attempts on each of them. This works for us because the usernames follow a very specific format, and our password policy is quite strict meaning that the number of possible username/password combos we pull out of emails is quite low.

It has been very successful for us.

--
Mike Cardwell
(https://secure.grepular.com/) (http://perlcv.com/)

Reply via email to