You would like to monitor any inbound emails containing Bitcoin wallet addresses or Bitcoin related spam.
Email security.cloud
You receive too many Bitcoin email notifications or alerts that affects consistency of your daily tasks.
Bitcoin was the first decentralized cryptocurrency (see What is Bitcoin?). While Bitcoin transactions are well documented, there is no name attached to the wallet. This helps in making the currency ideal for scammers and is often seen in ransom emails. These ransom emails can also use foreign or rarely used character sets that make detection based on wording very difficult. Utilizing Symantec Email Security.cloud along with Data Protection, these emails can be detected.
It is important to note that Bitcoin on its own, just like any other currency, is not malicious and used for many legitimate means. Take this into consideration when setting a Data Protection action below.
Rule 1:
Control Body Content
âÂÂCondition 1:
âÂÂâÂÂContent Regular Expression List
âÂÂâÂÂâÂÂ- Mixed CharsetsOR
âÂÂCondition 2:
âÂÂâÂÂKeyword List
âÂÂâÂÂâÂÂ- Cryptocurrency KeywordsOR
âÂÂCondition 3:
âÂÂâÂÂContent Regular Expression List
âÂÂâÂÂâÂÂ- Zero Length Spaces
AND
Rule 2:
Wallet Detection
âÂÂCondition 1:
âÂÂâÂÂContent Regular Expression List
âÂÂâÂÂâÂÂ- Cryptocurrency Wallet
(Optional) AND
Rule 3:
Exceptions
âÂÂâÂÂCondition 1:
âÂÂâÂÂâÂÂSender Domain List
âÂÂâÂÂâÂÂâÂÂ- Valid Cryptocurrency sources
The policy will look for a Bitcoin wallet address inside the body of the inbound email. If a Bitcoin wallet identifier is found, it will then check if the sender's domain is listed as a valid source. If the sending domain does not appear in the exceptions list, the rule will trigger.
(?:\p{L}+)?(?:\p{IsLatin}(?:\p{S}|\p{P})?\p{IsCyrillic}|\p{IsCyrillic}(?:\p{S}|\p{P})?\p{IsLatin})(?:\p{L}+)?
beutel
Bezahlung
bitcoin
bitcoins
criptovaluta
crypto
cryptocurrency
cryptowaluta
digitale geldbeutel
masturbi
pay
payment
pÃ
ÂaciÃÂ
pÃ
ÂatnoÃ
ÂÃÂ
porn
porno
portafoglio bitcoin
portfel
transfer
video
wallet
zahlen
ñøÃÂúþøý
ñøÃÂúþøýÃÂ
òøôõþ
úþÃÂõûõú
úÃÂøÿÃÂþ
úÃÂøÿÃÂþòðûÃÂÃÂð
þÿûðÃÂð
ÿûðÃÂøÃÂÃÂ
ÃÂÃÂðýÃÂÃÂõÃÂ
BTC
BTC address
(?:\u200b{1,3})
(?:\u200c{1,3})
(?:\u200d{1,3})
(?:\u200e{1,3})
(?:\u200f{1,3})
(?:\u2060{1,3})
(?:\ufeff{1,3})
(?:\u00AD{1,3})
(?:\u00A0{1,3})
(?:^[\t ]*?|[\t\v ]{1,}[-:.]|[-:.]?[\t ]{1,5})(?<!(?i)fingerprint: |checksum: |security code: (?-i))((?:[13])[a-km-zA-HJ-NP-Z1-9]{25,35}(?=$|[-:.]?[\t ]{1,}|[-:.]$))
(?:^[\t ]*?|[\t\v ]{1,}[-:.]|[-:.]?[\t ]{1,5})(?<!(?i)fingerprint: |checksum: |security code: (?-i))((?:bc|tb)(?:0([a-zA-HJ-NP-Z0-9]{39}|[a-zA-HJ-NP-Z0-9]{59})|1[a-zA-HJ-NP-Z0-9]{8,87}))(?=$|[-:.]?[\t ]{1,}|[-:.]$)
(?:^[\t ]*?|[\t\v ]{1,}[-:.]|[-:.]?[\t ]{1,5})(?<!(?i)fingerprint: |checksum: |security code: (?-i))(0x[a-fA-F0-9]{40})(?=$|[-:.]?[\t ]{1,}|[-:.]$)
Note: The next rule is optional and is only needed if you have a need for specific domains to send you bitcoin.
Note: Don't forget to Activate ( ) the policy.
Before you create the report, ensure that you are using the local main account or a secondary user with the role or permission of "View Sensitive statistics" assigned to it. Secondly, ensure that the following Data Protection options are activated.
Note: If you have a partner, or if you are a partner creating policies or reports on behalf of your clients, your partner account will not work to create this report.
This example shows how a report looks in Microsoft Excel (with non-relevant columns hidden).
A | B | C | D | E | F | G | H | I | ⦠| |
---|---|---|---|---|---|---|---|---|---|---|
1 | Time Period | ⦠| ⦠| ⦠| Email Subject | Email To | Email From | ⦠| Matched Content | ⦠|
2 | 28/07/2018 22:48 | ⦠| ⦠| ⦠| Subject Line | [email protected] | [email protected] | ⦠| 1Djduu4yaSmbyNBEgKfYMn4SySkjLx1dHC <[email protected]> </[email protected]> | ⦠|
3 | 28/07/2018 21:31 | ⦠| ⦠| ⦠| Some Subject | [email protected] | [email protected] | ⦠| 1CDdmD49ufFqrGMxCTEvEXxZWsUFoE4ZUn | ⦠|
With everything in place, begin analyzing the report every couple of days, work out the valid sources, and approve them in the Exceptions condition.
This process may take several weeks depending on the email flow and the number of individual, valid sources. Symantec recommends that you change the action of the Bitcoin Detection policy only after you can accept the reduced risk of false positives. This risk should be minimal after several weeks of approvals.
After Log Only, the next action we suggest is Redirect to Administrator, where the emails get sent to the specified admin email used in this policy. You should create this admin email specifically for this purpose, with the goal of keeping emails in the event a false positive occurs. This enables you to retrieve the email if necessary.