On Sat, 1 Oct 2011, Benny Pedersen wrote:

> On Fri, 30 Sep 2011 14:44:23 -0500, Daniel McDonald wrote:
>
> > Someone ran a beta ADDRBL back in 2009.  I still have the code and
> > run a
> > couple of private EmailBL lists.
>
> cool want to share lists ?
>
> i did test it, but gave up on maintaining it self
>
> much simplier to ask for dkim/spf pass and consider the rest as a phish
> :)
>

Unfortunately, you cannot count on dkim/spf pass as a good enough "phish"
filter. I've seen plenty of dkim/spf fails on valid mail and numerous
phishes that passed dkim/spf tests.

Our users are regularly targets of phish attacks. phishers love to
get student accounts at educational institutions (fat pipes, lots of
international traffic, often low oversight), so I've seen plenty
of phishes come from compromised user accounts at other schools.

phish attacks are an almost daily issue here, with all kinds of
variants, some of them quite well done. Even to the extent that they
were clearly reading service bulletins put out by the central IT
staff and crafting 'spear phishing' attacks to align with those
events. ;( (they had a hay-day when central went from Exchange-2007
to Exchange-2010; "You must revalidate your account on the new
mail server, send us your password...").

-- 
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to