| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
# |
|
2
|
|
|
|
|
|
|
# Author: Giovanni Bechis <gbechis@apache.org> |
|
3
|
|
|
|
|
|
|
# Copyright 2018,2019 Giovanni Bechis |
|
4
|
|
|
|
|
|
|
# |
|
5
|
|
|
|
|
|
|
# <@LICENSE> |
|
6
|
|
|
|
|
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more |
|
7
|
|
|
|
|
|
|
# contributor license agreements. See the NOTICE file distributed with |
|
8
|
|
|
|
|
|
|
# this work for additional information regarding copyright ownership. |
|
9
|
|
|
|
|
|
|
# The ASF licenses this file to you under the Apache License, Version 2.0 |
|
10
|
|
|
|
|
|
|
# (the "License"); you may not use this file except in compliance with |
|
11
|
|
|
|
|
|
|
# the License. You may obtain a copy of the License at: |
|
12
|
|
|
|
|
|
|
# |
|
13
|
|
|
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0 |
|
14
|
|
|
|
|
|
|
# |
|
15
|
|
|
|
|
|
|
# Unless required by applicable law or agreed to in writing, software |
|
16
|
|
|
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, |
|
17
|
|
|
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|
18
|
|
|
|
|
|
|
# See the License for the specific language governing permissions and |
|
19
|
|
|
|
|
|
|
# limitations under the License. |
|
20
|
|
|
|
|
|
|
# </@LICENSE> |
|
21
|
|
|
|
|
|
|
# |
|
22
|
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
=head1 NAME |
|
24
|
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
Mail::SpamAssassin::Plugin::Phishing - check uris against phishing feed |
|
26
|
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
28
|
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
loadplugin Mail::SpamAssassin::Plugin::Phishing |
|
30
|
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
ifplugin Mail::SpamAssassin::Plugin::Phishing |
|
32
|
|
|
|
|
|
|
phishing_openphish_feed /etc/mail/spamassassin/openphish-feed.txt |
|
33
|
|
|
|
|
|
|
phishing_phishtank_feed /etc/mail/spamassassin/phishtank-feed.csv |
|
34
|
|
|
|
|
|
|
body URI_PHISHING eval:check_phishing() |
|
35
|
|
|
|
|
|
|
describe URI_PHISHING Url match phishing in feed |
|
36
|
|
|
|
|
|
|
endif |
|
37
|
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
39
|
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
This plugin finds uris used in phishing campaigns detected by |
|
41
|
|
|
|
|
|
|
OpenPhish or PhishTank feeds. |
|
42
|
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
The Openphish free feed is updated every 6 hours and can be downloaded from |
|
44
|
|
|
|
|
|
|
https://openphish.com/feed.txt. |
|
45
|
|
|
|
|
|
|
The Premium Openphish feed is not currently supported. |
|
46
|
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
The PhishTank free feed is updated every 1 hours and can be downloaded from |
|
48
|
|
|
|
|
|
|
http://data.phishtank.com/data/online-valid.csv. |
|
49
|
|
|
|
|
|
|
To avoid download limits a registration is required. |
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
=cut |
|
52
|
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
package Mail::SpamAssassin::Plugin::Phishing; |
|
54
|
19
|
|
|
19
|
|
152
|
use strict; |
|
|
19
|
|
|
|
|
61
|
|
|
|
19
|
|
|
|
|
666
|
|
|
55
|
19
|
|
|
19
|
|
123
|
use warnings; |
|
|
19
|
|
|
|
|
63
|
|
|
|
19
|
|
|
|
|
922
|
|
|
56
|
|
|
|
|
|
|
my $VERSION = 1.1; |
|
57
|
|
|
|
|
|
|
|
|
58
|
19
|
|
|
19
|
|
150
|
use Errno qw(EBADF); |
|
|
19
|
|
|
|
|
56
|
|
|
|
19
|
|
|
|
|
1045
|
|
|
59
|
19
|
|
|
19
|
|
164
|
use Mail::SpamAssassin::Plugin; |
|
|
19
|
|
|
|
|
49
|
|
|
|
19
|
|
|
|
|
633
|
|
|
60
|
19
|
|
|
19
|
|
117
|
use Mail::SpamAssassin::PerMsgStatus; |
|
|
19
|
|
|
|
|
40
|
|
|
|
19
|
|
|
|
|
19312
|
|
|
61
|
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
our @ISA = qw(Mail::SpamAssassin::Plugin); |
|
63
|
|
|
|
|
|
|
|
|
64
|
0
|
|
|
0
|
1
|
0
|
sub dbg { Mail::SpamAssassin::Plugin::dbg ("Phishing: @_"); } |
|
65
|
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
sub new { |
|
67
|
60
|
|
|
60
|
1
|
280
|
my ($class, $mailsa) = @_; |
|
68
|
|
|
|
|
|
|
|
|
69
|
60
|
|
33
|
|
|
434
|
$class = ref($class) || $class; |
|
70
|
60
|
|
|
|
|
341
|
my $self = $class->SUPER::new($mailsa); |
|
71
|
60
|
|
|
|
|
188
|
bless ($self, $class); |
|
72
|
|
|
|
|
|
|
|
|
73
|
60
|
|
|
|
|
303
|
$self->set_config($mailsa->{conf}); |
|
74
|
60
|
|
|
|
|
351
|
$self->register_eval_rule("check_phishing"); |
|
75
|
|
|
|
|
|
|
|
|
76
|
60
|
|
|
|
|
565
|
return $self; |
|
77
|
|
|
|
|
|
|
} |
|
78
|
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
sub set_config { |
|
80
|
60
|
|
|
60
|
0
|
180
|
my ($self, $conf) = @_; |
|
81
|
60
|
|
|
|
|
126
|
my @cmds; |
|
82
|
60
|
|
|
|
|
307
|
push(@cmds, { |
|
83
|
|
|
|
|
|
|
setting => 'phishing_openphish_feed', |
|
84
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING, |
|
85
|
|
|
|
|
|
|
} |
|
86
|
|
|
|
|
|
|
); |
|
87
|
60
|
|
|
|
|
288
|
push(@cmds, { |
|
88
|
|
|
|
|
|
|
setting => 'phishing_phishtank_feed', |
|
89
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING, |
|
90
|
|
|
|
|
|
|
} |
|
91
|
|
|
|
|
|
|
); |
|
92
|
60
|
|
|
|
|
311
|
$conf->{parser}->register_commands(\@cmds); |
|
93
|
|
|
|
|
|
|
} |
|
94
|
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
sub finish_parsing_end { |
|
96
|
60
|
|
|
60
|
1
|
188
|
my ($self, $opts) = @_; |
|
97
|
60
|
|
|
|
|
833
|
$self->_read_configfile($self); |
|
98
|
|
|
|
|
|
|
} |
|
99
|
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
sub _read_configfile { |
|
101
|
60
|
|
|
60
|
|
187
|
my ($self) = @_; |
|
102
|
60
|
|
|
|
|
200
|
my $conf = $self->{main}->{registryboundaries}->{conf}; |
|
103
|
60
|
|
|
|
|
114
|
my @phtank_ln; |
|
104
|
|
|
|
|
|
|
|
|
105
|
60
|
|
|
|
|
289
|
local *F; |
|
106
|
60
|
50
|
33
|
|
|
289
|
if ( defined($conf->{phishing_openphish_feed}) && ( -f $conf->{phishing_openphish_feed} ) ) { |
|
107
|
0
|
|
|
|
|
0
|
open(F, '<', $conf->{phishing_openphish_feed}); |
|
108
|
0
|
|
|
|
|
0
|
for ($!=0; <F>; $!=0) { |
|
109
|
0
|
|
|
|
|
0
|
chomp; |
|
110
|
|
|
|
|
|
|
#lines that start with pound are comments |
|
111
|
0
|
0
|
|
|
|
0
|
next if(/^\s*\#/); |
|
112
|
0
|
|
|
|
|
0
|
my $phishdomain = $self->{main}->{registryboundaries}->uri_to_domain($_); |
|
113
|
0
|
0
|
|
|
|
0
|
if ( defined $phishdomain ) { |
|
114
|
0
|
|
|
|
|
0
|
push @{$self->{PHISHING}->{$_}->{phishdomain}}, $phishdomain; |
|
|
0
|
|
|
|
|
0
|
|
|
115
|
0
|
|
|
|
|
0
|
push @{$self->{PHISHING}->{$_}->{phishinfo}->{$phishdomain}}, "OpenPhish"; |
|
|
0
|
|
|
|
|
0
|
|
|
116
|
|
|
|
|
|
|
} |
|
117
|
|
|
|
|
|
|
} |
|
118
|
|
|
|
|
|
|
|
|
119
|
0
|
0
|
0
|
|
|
0
|
defined $_ || $!==0 or |
|
|
|
0
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
$!==EBADF ? dbg("PHISHING: error reading config file: $!") |
|
121
|
|
|
|
|
|
|
: die "error reading config file: $!"; |
|
122
|
0
|
0
|
|
|
|
0
|
close(F) or die "error closing config file: $!"; |
|
123
|
|
|
|
|
|
|
} |
|
124
|
|
|
|
|
|
|
|
|
125
|
60
|
50
|
33
|
|
|
468
|
if ( defined($conf->{phishing_phishtank_feed}) && (-f $conf->{phishing_phishtank_feed} ) ) { |
|
126
|
0
|
|
|
|
|
|
open(F, '<', $conf->{phishing_phishtank_feed}); |
|
127
|
0
|
|
|
|
|
|
for ($!=0; <F>; $!=0) { |
|
128
|
|
|
|
|
|
|
#skip first line |
|
129
|
0
|
0
|
|
|
|
|
next if ( $. eq 1); |
|
130
|
0
|
|
|
|
|
|
chomp; |
|
131
|
|
|
|
|
|
|
#lines that start with pound are comments |
|
132
|
0
|
0
|
|
|
|
|
next if(/^\s*\#/); |
|
133
|
|
|
|
|
|
|
|
|
134
|
0
|
|
|
|
|
|
@phtank_ln = split(/,/, $_); |
|
135
|
0
|
|
|
|
|
|
$phtank_ln[1] =~ s/\"//g; |
|
136
|
|
|
|
|
|
|
|
|
137
|
0
|
|
|
|
|
|
my $phishdomain = $self->{main}->{registryboundaries}->uri_to_domain($phtank_ln[1]); |
|
138
|
0
|
0
|
|
|
|
|
if ( defined $phishdomain ) { |
|
139
|
0
|
|
|
|
|
|
push @{$self->{PHISHING}->{$phtank_ln[1]}->{phishdomain}}, $phishdomain; |
|
|
0
|
|
|
|
|
|
|
|
140
|
0
|
|
|
|
|
|
push @{$self->{PHISHING}->{$phtank_ln[1]}->{phishinfo}->{$phishdomain}}, "PhishTank"; |
|
|
0
|
|
|
|
|
|
|
|
141
|
|
|
|
|
|
|
} |
|
142
|
|
|
|
|
|
|
} |
|
143
|
|
|
|
|
|
|
|
|
144
|
0
|
0
|
0
|
|
|
|
defined $_ || $!==0 or |
|
|
|
0
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
$!==EBADF ? dbg("PHISHING: error reading config file: $!") |
|
146
|
|
|
|
|
|
|
: die "error reading config file: $!"; |
|
147
|
0
|
0
|
|
|
|
|
close(F) or die "error closing config file: $!"; |
|
148
|
|
|
|
|
|
|
} |
|
149
|
|
|
|
|
|
|
} |
|
150
|
|
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
sub check_phishing { |
|
152
|
0
|
|
|
0
|
0
|
|
my ($self, $pms) = @_; |
|
153
|
|
|
|
|
|
|
|
|
154
|
0
|
|
|
|
|
|
my $feedname; |
|
155
|
|
|
|
|
|
|
my $domain; |
|
156
|
0
|
|
|
|
|
|
my $uris = $pms->get_uri_detail_list(); |
|
157
|
|
|
|
|
|
|
|
|
158
|
0
|
|
|
|
|
|
my $rulename = $pms->get_current_eval_rule_name(); |
|
159
|
|
|
|
|
|
|
|
|
160
|
0
|
|
|
|
|
|
while (my($uri, $info) = each %{$uris}) { |
|
|
0
|
|
|
|
|
|
|
|
161
|
|
|
|
|
|
|
# we want to skip mailto: uris |
|
162
|
0
|
0
|
|
|
|
|
next if ($uri =~ /^mailto:/i); |
|
163
|
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
# no hosts/domains were found via this uri, so skip |
|
165
|
0
|
0
|
|
|
|
|
next unless ($info->{hosts}); |
|
166
|
0
|
0
|
0
|
|
|
|
if (($info->{types}->{a}) || ($info->{types}->{parsed})) { |
|
167
|
|
|
|
|
|
|
# check url |
|
168
|
0
|
|
|
|
|
|
foreach my $cluri (@{$info->{cleaned}}) { |
|
|
0
|
|
|
|
|
|
|
|
169
|
0
|
0
|
|
|
|
|
if ( exists $self->{PHISHING}->{$cluri} ) { |
|
170
|
0
|
|
|
|
|
|
$domain = $self->{main}->{registryboundaries}->uri_to_domain($cluri); |
|
171
|
0
|
|
|
|
|
|
$feedname = $self->{PHISHING}->{$cluri}->{phishinfo}->{$domain}[0]; |
|
172
|
0
|
|
|
|
|
|
dbg("HIT! $domain [$cluri] found in $feedname feed"); |
|
173
|
0
|
|
|
|
|
|
$pms->test_log("$feedname ($domain)"); |
|
174
|
0
|
|
|
|
|
|
$pms->got_hit($rulename, "", ruletype => 'eval'); |
|
175
|
0
|
|
|
|
|
|
return 1; |
|
176
|
|
|
|
|
|
|
} |
|
177
|
|
|
|
|
|
|
} |
|
178
|
|
|
|
|
|
|
} |
|
179
|
|
|
|
|
|
|
} |
|
180
|
0
|
|
|
|
|
|
return 0; |
|
181
|
|
|
|
|
|
|
} |
|
182
|
|
|
|
|
|
|
|
|
183
|
|
|
|
|
|
|
1; |