-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Return reason for classification as "bad" #94
Comments
I am not sure where you are looking for the reason. We report our findings back to amavis. The entire output should be part of the virusmail. (Same file as below, line 315. RuleResult is later used to create our report) Except for one case we deliberately don't give any details - if Cuckoo analysis fails, this is to not give any hints to a potential attacker: PeekabooAV/peekaboo/ruleset/rules.py Line 247 in bf5f7a7
|
Ah I think I see what you mean. You mean the report like this?
I'm looking for an output like Or did I oversaw a placeholder in the amavis template for this type of info? |
Any suggestions on how to implement this? |
You would prefer not not see the results of rules that didn't classify? More like this?
|
I think that would be a little enhancement. But I don't thought about that I should be more clear at the beginning, I admit. Hope this is now unserstandable: According to the amavis documentation for customizing the notification messages, in the notification templates there is %V which returns whereas %v returns But %V seems to be empty In my case I don't have a problem that %v is the full output but it would be handy if %V returns the triggered signature Thank you for your effort! |
It would be cool if Peekaboo could return the evil sig that was triggered and is the reason why the file is classified as bad.
Like ClamAV and other engines are returning something like "VBS/TrojanDownloader.Agent.PDK", Peekaboo could return for example "Installs itself for autorun at Windows startup" or something like that to amavis
That information could be included in admin and recipient notifications
Expected Behavior
Returns the reason why it was classified as bad
Current Behavior
Does not return something to amavis that indicates the decision
Context (Environment)
Every time amavis founds malicious content it sends an email to our IT department and to the recipient. Sometimes it is not directly clear if it's maybe a false positive, for example, if the forged sender is @dhl.com and the recipient is in that moment awaiting a message from DHL.
Also, we had an incident last week where a customer (with no peekaboo or other) forwarded us a suspicious application email as they are currently searching for a new staff member. This forwarded email was blocked with peekaboo on our side but the requested IT colleague was not near to 100% sure if it is maybe a false positive since he is not directly familiar with cuckoo to check what the cuckoo analysis said.
I think in both cases, it would give the notifications to recipient and admin a more meaningful tone if there could be the reason placed why it actually blocked the email.
Possible Implementation
I would say the easiest way would be to return the evil sig to amavis.
Maybe it would also be possible to categories it into things like spyware if e.g. a keylogger is detected, ransomeware when it deletes or encrypts files, etc. I think the second is maybe interesting for the not near future as this is a more complicated task and other features have a higher priority.
The text was updated successfully, but these errors were encountered: