You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@spamassassin.apache.org by "Chip M." <sa...@IowaHoneypot.com> on 2016/05/05 18:39:18 UTC
Re: new(ish) malware: RTF with MIME payload
Thanks guys, for all the helpful info and sanity checks! :)
Sorry about the Message-ID munging - I get some really useful
malware at that domain but no ham, and am a bit paranoid about
losing that feed.
Followup:
>I had considered anchoring the MIME string, however we have a
>very powerful quarantine system, so I kept that rule simple.
>We've had zero FPs on either rule, albeit only in xml/doc/msword
>files.
I changed my system to run that MIME string test on all message
parts (plain text, de-MIMEd file, de-MIMEd non-file MIME), then
we did a regression test on all 2015 & 2016 ham for most of our
key corpora. We also tested 2013 & 2014 ham-only for a few of
the most useful corpora, for a grand total of about 1.4 million
individual emails.
We found exactly zero hits on ham. :)
Not counting "my" SA list digest.
That rule is now live on all our systems, at Exterminate score.
We'll be doing a few more corpora in the next two weeks, and if
there's any hits, I'll report back.
While it is hypothetically possible that somebody would send a
document with ActiveMime, I personally am trusting my quarantine
sytem to detect those. We can individually "skip" list that rule
if needed, just like we already do with Word macros and other
Pakled-icity. ;)
- "Chip"