X-Forefront-Antispam-Report: ...;SFV:SPM;... We have a policy on a per message basis of not blocking anything from leaving the site, but we do send it out a different pool, and we do try to flag it as spam. As always, there can be both FNs and FPs, so be advised.
Aloha, Michael. -- Michael J Wise Microsoft Corporation| Spam Analysis "Your Spam Specimen Has Been Processed." Open a ticket for Hotmail<http://go.microsoft.com/fwlink/?LinkID=614866> ? From: mailop <mailop-boun...@mailop.org> On Behalf Of Robert L Mathews via mailop Sent: Friday, September 20, 2024 10:01 AM To: mailop@mailop.org Subject: [EXTERNAL] [mailop] onmicrosoft.com customers forging @microsoft.com addresses for phishing I've seen quite a few cases recently where it looks like people sign up for a Microsoft cloud service (Azure?), and are then able to send mail that claims to be from @microsoft.com in the "From" header. The resulting mail passes both SPF and DKIM checks. For example, this phishing message successfully passes SpamAssassin with "DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain": Return-Path: bounces+SRS=zWGj+=q...@sheilaltd.onmicrosoft.com<mailto:bounces+SRS=zWGj+=q...@sheilaltd.onmicrosoft.com> X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 20.69.8.109) smtp.mailfrom=microsoft.com; dkim=pass (signature was verified) header.d=microsoft.com;dmarc=pass action=none header.from=microsoft.com; Received-SPF: Pass (protection.outlook.com: domain of microsoft.com designates 20.69.8.109 as permitted sender) receiver=protection.outlook.com; client-ip=20.69.8.109; helo=mail-nam-cu09-cy.westcentralus.cloudapp.azure.com; pr=C DKIM-Signature: v=1; a=rsa-sha256; d=microsoft.com; s=s1024-meo; c=relaxed/relaxed; i=microsoft-nore...@microsoft.com<mailto:i=microsoft-nore...@microsoft.com>; t=1726749195; h=from:subject:date:message-id:to:mime-version:content-type; bh=7ly01TFWrXYbreqkdNSOhkq4Nz8y28Mdjn0eMxCBVTw=; b=MVlEt8w4NMMWwxGJTAIAsP/KVcxnZ8XV1QYNSkB5zqo/GQJf+fXednkdXQXZ4LWXqZkzSJFTshV pRM5q2Bk6rAsg1zNa8uCJ3YyNBcVzWnhkl0JJwr16zpdNBOuuex5Cehynjiwf+I/ZWLPzp4hmy3v1 74cnBd9OLJD+vnu1CDQ= From: Microsoft <microsoft-nore...@microsoft.com<mailto:microsoft-nore...@microsoft.com>> Date: Thu, 19 Sep 2024 12:33:15 +0000 Subject: Your Microsoft order on September 19, 2024 Message-ID: <703d1f73-6ccd-4265-888b-e0819add3...@az.westcentralus.microsoft.com<mailto:703d1f73-6ccd-4265-888b-e0819add3...@az.westcentralus.microsoft.com>> To: microsoft-re...@m365salesteam.onmicrosoft.com<mailto:microsoft-re...@m365salesteam.onmicrosoft.com> X-OriginatorOrg: sheilaltd.onmicrosoft.com I've omitted most of it here but you can see the full thing, with only a bit of redaction for privacy, at <https://tigertech.net/files/onmicrosoft.com.txt>. I know that the recommended solution is probably to not accept anything at all from "onmicrosoft.com", but testing shows that would generate a few false positives. Is Microsoft aware this is happening, and working to stop it? -- Robert L Mathews
_______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop