On 30/09/11 18:04, John Hardin wrote:
On Fri, 30 Sep 2011, Ned Slider wrote:

On 30/09/11 01:41, jida...@jidanni.org wrote:
Sure a lot of "Your mailbox has exceeded" spam these days. I'll use

body J_MAILBOX_FULL /^Your mailbox has exceeded/
score J_MAILBOX_FULL ...

myself for now.

I've seen a few of these, but probably not enough examples to have
Bayes reliably catch them yet - the first few sneaked straight through
uncaught.

If we could organise a working group or something, and/or collect some
examples, I'd happily help with writing some rules specifically for
these.

I've been collecting phishes for a while now - in several languages -
and I've been intending to start working on some rules, perhaps evolved
along the lines of the ADVANCE FEE rules.

Anyone who wants to send me .tar.gz archives of phish samples is welcome
to do so.


John,

I have a rather small set (277) of purely UK bank-related phish I started collecting back in 2009 (happy to share them with you if you feel such a small/old set would be useful). Similarly, my plan was to try to write a set of rules to catch these. In the end I took a somewhat different (and simpler) approach of scoring all mail that claims to be FROM a banking domain, and then whitelist legitimate senders through whitelist_from_dkim/spf.

# Claiming to be from a bank or other financial institution
# We can whitelist legitimate mail using SPF and/or DKIM

header LOCAL_FROM_BANK From:addr =~ /\@(abbey|abbeyinternational|abbeynational|allianceleicester|alliance-leicester|bankofamerica|barclaycard|barclays|cahoot|cbonline|citibank|cooperativebank|co-operativebank|cooperative-bank|egg|eggconnect|firstdirect|halifax|halifax-online|hbos|hsbc|hsbcgroup|lloydstsb|mbna|natwest|nationwide|newegg|new\.egg|northernbank|northernrock|nwolb|rbs|santander|santandercards|smile|woolwich|ybonline|zenithbank)\.(com|co\.uk)/i
score           LOCAL_FROM_BANK         6
describe        LOCAL_FROM_BANK         From a bank domain

I have more rules along this line scoring senders from .org/net domains etc that banks are unlikely to ever use - I'm sure you get the idea.

This approach stemmed from the fact that for my small set of banking phish, I noticed nearly all claim to be FROM the primary domain (e.g. @bank.com), wherein in reality (again from the very small set of legitimate banking mails I have) banks typically send from a subdomain, something like @email.bank.com or @e.bank.com etc, so this approach seems to produce very few FPs.

Not the most sophisticated approach but it works really well for me - it just needs a different mindset, moving from the default view that one should accept all email and then try to filter out the spam to one where we deny all bank-related email by default and then whitelist the known good senders. Ultimately 99% of email I see claiming to be from a bank was phish.

If one were to adopt such an approach, it would be useful to share information of which domains have working spf records and/or dkim signatures as this information isn't always easy to collate, and such domains could either be incorporated into SA's USER_IN_DEF_*_WHITELIST's or shipped as separate whitelist_from_dkim/spf rule sets that users could enable/disable at will.

If banks were to clearly publish the (sub)domains they intend to send mail from, and publish accurate spf records/dkim signatures for those domains then this would be an almost trivial issue to solve.

I'm really not sure of the best approach to tackling the wider phish problem, nor the specific problem of mailbox phish of this thread.





Reply via email to