For this type spam (works not always, but better than nothing):

acl_check_mime:
  deny  condition = ${if eq{$mime_content_type}{text/plain}}
        !hosts = +whitelisted_hosts
        !sender_domains = returns.groups.yahoo.com : groups.io
        !authenticated = *
        condition = ${if !def:header_List-ID:}
        set acl_m_fakedom = ${if match{$message_headers_raw}{\N\nReceived: \
                                        .*?(?:\n\s.*?)*?\
          (?:helo=|HELO |EHLO |from )([a-z]{4,6}\.(?:com|net|org))\
                                        .*?(?:\n\s.*?)*?\
          (?i)(?:smtpsa|bizsmtp)\
                                        .*?(?:\n\s.*?)*?\
          \n[^R\s]\N}{$1}}
        condition = ${if def:acl_m_fakedom}
        mime_regex = https?.//
        !mime_regex = (?s)https?.//.+https?.//
        condition = ${if eq{}{${lookup dnsdb{defer_never,a=$acl_m_fakedom}}}}
        condition = ${if eq{}{${lookup dnsdb{defer_never,mxh=$acl_m_fakedom}}}}
        message = trojan link suspected: \
          ${if match{$message_body}{\N(https?://[^>\s]+)\N}{$1}} \
          rcpthelo=$acl_m_fakedom recipients=$recipients

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to