[clamav-users] FP with Heuristics.Phishing.Email.SpoofedDomain
Kris Deugau
kdeugau at vianet.ca
Wed Aug 29 19:30:34 UTC 2018
Paul wrote:
> Hi
>
> I have 2 emails which have tripped
> Heuristics.Phishing.Email.SpoofedDomain (4 times in each email using
> clamscan -x option)
>
> Is the output from clamscan -x --debug shown below indicate the
> offending url pair triggering Heuristics.Phishing.Email.SpoofedDomain?
>
> LibClamAV debug: Phishing: looking up in whitelist:
> .clicktime.symantec.com:.www
> .barclays.co.uk; host-only:1
Seems likely; this is exactly the kind of URL mismatch it's intended to
trigger on.
I have yet to find a guaranteed consistent way to take these entries and
convert them to a local whitelist entry for a local .wdb file, but some
variation of one of these should work:
M:clicktime.symantec.com:barclays.co.uk
X:\.clicktime\.symantec\.com:www\.barclays\.co\.uk/
However, locally I've also given up on having this enabled where it's an
absolute black/white test; I've disabled it for the main Clam instance,
and set up a secondary one with this test and a list of variously risky
third-party signatures whose results are scored in SpamAssassin instead.
-kgd
More information about the clamav-users
mailing list