On 10/24/2017 07:41 PM, Alex wrote:
On Tue, Oct 24, 2017 at 2:49 PM, David Jones <djo...@ena.com> wrote:
On 10/24/2017 01:32 PM, Alex wrote:

Hi all, I'm wondering if someone has some ideas to handle bank fraud
phishing emails, and in particular this one:

https://pastebin.com/wxFtKK16

It doesn't hit bayes99 because we haven't seen one before, and txrep
subtracts points. It also doesn't hit any blacklists.

Ideas for blocking these, and more general advice for blocking banking
fraud/phish attacks would be appreciated.


Zero-hour phishing emails from Office 365 are going to be tough to block.
About all you can do is add a blacklist_from *@mybenefitswallet.com entry
and report it to SpamCop and ph...@office365.microsoft.com.

For the most part, I agree, but the client here has also contracted
with Wombat and they managed to detect this email as "Probably Phish".
We're missing something with spamassassin.


They could have some general rules like:

/account.{1,30}locked/i
/email.{1,50}security/i

that would flag a lot of legit emails as "Probably Phish". If they do this a lot then users will ignore that flag and quickly it becomes useless.

Are they modifying the subject with "Probably Phish" to tell the users? It's much easier to modify the subject of false positives with a very low score vs. what Spamassassin has to do by accurately scoring the message.

That message did have a lot of bad English and mispellings. Too bad we can't introduce AI into SA somehow in a secure way locally where no information was sent out to the cloud. This would be about the only chance to stop zero-hour spam that has been hand crafted to pass through most mail filters before DCC, Razor, Bayes, RBLs, DBLs, detect and react to it.

--
David Jones

Reply via email to