On Sun, 28 Feb 2010, LuKreme wrote:

> On 28-Feb-10 17:25, David B Funk wrote:
> > I'm seeing a spate of PayPal/bank phishes that use an html attachment
> > (base-64 encoded) as the vehicle for the payload.
>
> SPF!
>
> <runs; ducking, shucking, and weaving>

Actually I'm happy to utilize SPF when I can. But westernunion.com
doesn't publish SPF records.

And this -is- a case in point where SPF is relevant to SA. ;)

> > Is there any way to get SA to treat that attachment as text to feed to
> > the rule engine?
>
> Your best bet is to check if mail claiming to be from paypal is, in
> fact, from paypal. Without checking SPF, you can at least check if the
> server sending the mail is a paypal server using just header checks.
>
> If you search the archives for paypal ebay you should find a few
> solutions on how to deal with these.

I've got a number of PayPal specific rules, but these phishes are all
over the financial spectrum (banks, paypal, ebay, western-union, etc).
The clear-text verbage is vague enough to make writing FP-proof but
effective rules difficult. That's why I was hoping to be able to hit
against the HTML payload.

-- 
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to