On 08/24/2018 07:02 PM, Kevin A. McGrail wrote:
On 1/18/2018 6:52 AM, Pedro David Marco wrote:
David,

This rule can do the full job... i have tested it with good results..  (Can be tested here: https://regex101.com/r/Vpmhjz/3 )

It checks if the level domain next to the TLD in the From:name matches the domain next to the TLD in From:email

header       FROM_DOMAINS_MISMATCHFrom !~/(?:[^<].+?)\@(?:.+?\.)*?(.+?\.)(?:.+?).*?<.+?(\@\1|\@.*?\.\1)/
describe    FROM_DOMAINS_MISMATCHDomain name mismatch in From header
Did this ever get considered for a sandbox.

Alan Hodgson also had a good posted on one but not tested.
Regards,
KAM

I am not sure this is going to be worth as sandbox rule. There are going to be a high number of system-generated and mass-marketing emails that aren't going to match the From: header.

From my experience, this is a local rule that detects high-value display names in phishing attempts. For example, the C-level executive's name as the Display Name when it comes from gmail.com to the Finance department to wire money.

From: "CEO Name Here" <john...@gmail.com>

Also, DMARC is supposed to help with this spoofing of the From: header. I handle this locally with OpenDMARC adding headers used in an SA meta rule. This is the best way to handle this until SA natively supports DMARC.

--
David Jones

Reply via email to