I'm seeing a spate of PayPal/bank phishes that use an html attachment
(base-64 encoded) as the vehicle for the payload.

The body has some innocuous verbiage about problems with the recipients
account and an admonition to complete the attached form to remove
the "limitations".
The attached form is of type "application/octet-stream" with a name
that is of the form "something.html" so that it gets fed to a web-browser
when the victim clicks on it. The html is a form that collects the user's
info and then does a "post" to the attacker's collection site.

If I save the attachment and view it as a text file I can see lots of
things to write rules against (it even contains target URLs that are
listed in SURBL blacklists). However all attempts to create such rules
fail to to match (I'm assuming because of the "application/octet-stream"
mime type).

Is there any way to get SA to treat that attachment as text to feed to
the rule engine?

-- 
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to