Hi,

On Tue, Aug 22, 2017 at 8:46 PM, Dianne Skoll <d...@roaringpenguin.com> wrote:
> On Tue, 22 Aug 2017 20:19:06 -0400
> Alex <mysqlstud...@gmail.com> wrote:
>
>> > Take a look at podofopdfinfo.  It can extract URLs from PDF docs
>> > and you can trigger on those.
>
>> Thank you. It didn't work on this one :-(
>
> It worked for me:
>
> $ podofopdfinfo pdf-phish.pdf
> Document Info
> -------------
>         File: pdf-phish.pdf
>         PDF Version: 1.5
> [,,, much output deleted ...]
>
>         Annotation 0
> [,,, much output deleted ...]
>
>                 Link Target: 1
>                 Action URI: http://dabanlar.com/west/scan.html

Ah, thank you. I used podofotxtextract.

John wrote:
>> Are there any current solutions for those of us with spamassassin and 
>> amavisd?

> clamav?

It's too slow to react, particularly when the PDFs are written
specifically to reach a domain. Sometimes the PDF will never be
detected by any of the antivirus scanners because of this.

Of course I'm further analyzing the other characteristics of the
message to build rules to stop them the next time, but this is still
after two emails were received with this PDF, each of which had like
40 recips. It only took a slight adjustment to my custom rules to
block these for next time, but an additional advantage with being able
to process the URLs would be nice.

>> I also don't see a way to use it with amavisd.
>
> Right.  I use MIMEDefang which is a little more flexible in how you
> glue the bits and pieces together.
>
>> "strings" was able to extract the URL.
>
> That works this time, but generally speaking, PDF documents may be
> compressed in which case "strings" won't be useful.
>
> I reported the URL to Google as fraudulent.

Thank you. What other steps can be taken with more of an automated
approach? Would a plugin that does a reverse lookup on the domain then
check the various RBLs be conceivable? Or would you somehow re-inject
the URL back into SA somehow? How much programming is involved with
doing something like this?

Reply via email to