|
The names of the constants are self-explanatory. These constants are defined in libclamav/phishcheck.h, you can check there for the latest flags.. There is a default set of flags that are enabled, these are currently:
docs.clamav.net
|
sigtool --unpack /var/lib/clamav/daily.cld daily.wdb and you'll see a much larger list. Some are more complicated because they use various country codes in the domains, others are less so.
Hi,
The link description is a URL and apparently doesn't match the link
itself, resulting in email from Amazon Business being marked as
malicious. Do I just add this to some kind of allow/bypass list?
How do I go about doing that?
$ clamscan -v amazon-fp.eml
Scanning /home/alex/quarantine/amazon-fp.eml
LibClamAV info: Suspicious link found!
LibClamAV info: Real URL: https://www.amazonbusiness.com
LibClamAV info: Display URL: www.americanexpress.com
/root/quarantine/amazon-fp.eml: Heuristics.Phishing.Email.SpoofedDomain FOUND
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/contact.html#ml