On Mon, 12 Mar 2012 13:05:24 -0400
Paul Russell <pruss...@nd.edu> wrote:

> Most of the phishing spam we see seems to come from
> apparently-compromised accounts, so we seldom see the same sender
> address for more than a few hours, or a few days, at most.

Right... the list is reactive.  I find it usually takes anywhere from an
hour to a few hours for a compromised address to get on the list, so there
is some value if the address is used for more than a few hours.

Also, there's a lot of value in finding out that one of *your* users has
been compromised. :)  I see a couple of nd.edu addresses in the list,
though the last-seen dates are old (Aug and October 2011.)

> Phishing reply-to addresses and phishing URL's change less frequently.

> There are several variants of phishing message text, and new variants
> are introduced from time to time, but the message body seems to be
> the most reliable source of filter fodder.

I agree.  The APER project is just one more tool in the toolbox.

Regards,

David.

Reply via email to