Beta 4.52.1 released
Julian Field
MailScanner at ecs.soton.ac.uk
Mon Mar 27 18:26:28 IST 2006
The parser is failing to stop at the .com.
It cannot be perfect as it is a "Natural Language" problem which are
notoriously hard to solve.
However, I'll take a look at the parser and see if I can catch this one.
Ken A wrote:
>
>
> Julian Field wrote:
>> I think the answer is "nothing but log it", but test it out and let
>> me know.
>
> Looks like there may be a parsing problem in the phishing code.
> MailScanner logs this:
>
> Found phishing fraud from www.bizrate.com claiming to be
> www.foralimitedtime,getupto30%%offonalldwellbeddingandpillowsatwrapables.com.payo
> in k2RGgTj4022846
>
> Here's the html in the email that triggered this:
>
> <A href="http://www.bizrate.com/mkt.xpml?eml_id=134000" style="color:
> #000000;text-decoration:none;">For a limited time, get up to 30% off
> on all Dwell Bedding and Pillows at Wrapables.com. Pay only $5 to ship
> everything! Click now and save!</a>
>
> Thanks,
>
> Ken Anderson
> Pacific.Net
>
>
>
>> Ken A wrote:
>>> Julian,
>>> That sounds like a nice improvement. I had turned off the phishing
>>> code due to false positives with it, but will give it a shot with
>>> "Use Stricter Phishing Net = no".
>>>
>>> If I have Phishing Modify Subject = no, and Highlight Phishing Fraud
>>> = no, what does MailScanner do when it finds a phishing attempt? I'm
>>> hoping the answer is "nothing but log it", so that I can use this
>>> configuration for testing.
>>>
>>> Thanks,
>>> Ken A
>>> Pacific.Net
>>>
>>> Julian Field wrote:
>>>> I have just released a new beta version 4.52.1.
>>>>
>>>> There is 1 new feature in this release, but it will be important to
>>>> some of you, so please read on. It affects the phishing net, and
>>>> may give you pretty good protection against phishing scams, while
>>>> having a much lower false alarm rate than the full phishing net
>>>> code that has been there so far.
>>>>
>>>> You can now set "Use Stricter Phishing Net = no" which will make the
>>>> phishing net just check the name of the company owning the
>>>> website, along
>>>> with any country code of course. There is a configuration file
>>>> containing
>>>> a list of all the 2nd and 3rd level domain names in use by all
>>>> countries,
>>>> it lists domain endings such as "org.uk" which are used by a
>>>> country to
>>>> describe a whole type of websites within their country. So if the
>>>> website
>>>> is "www.hello.company.com" it knows to check just company.com,
>>>> whereas
>>>> given "www.byebye.charity.org.uk" it will check charity.org.uk.
>>>> The configuration file "Country Sub-Domains List" lists all the
>>>> entries
>>>> required for this to work in any country, 1 per line. You
>>>> shouldn't need
>>>> to touch this file.
>>>>
>>>> I hope you find this new feature useful, and it may enable some of
>>>> you (particularly large ISPs) to provide your customers and users
>>>> with a high level of protection against phishing scams.
>>>>
>>>> Let me know how you get on.
>>>>
>>
--
Julian Field
www.MailScanner.info
Buy the MailScanner book at www.MailScanner.info/store
Professional Support Services at www.MailScanner.biz
MailScanner thanks transtec Computers for their support
PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
More information about the MailScanner
mailing list