The instances of this we've seen - aren't actually phishing, just fraud. Generating invoices via PayPal to an o365 address that then forwards that out to the final recipient.
In the cases we've seen if you look at the links they do actually go to PayPal and the invoice does actually exist there. My assumption on this was that they're casting a huge net with the invoices and just hoping that any of the targets pays it. I.e. generate an invoice, send it to 1,000 people and your chances of that 1 in 1000 paying it are higher than if you sent it one-by-one to your targets. Phishing would be directing them to a non-legitimate site to steal their credentials, not a legitimate site to steal their money [fraudulently due to an unauthorized invoice]. Thank you, Michael Denney MDDHosting LLC http://www.mddhosting.com/ > On Dec 10, 2024, at 11:33 AM, Michael Peddemors via mailop > <mailop@mailop.org> wrote: > > Ouch.. getting even harder for recipient spam protections to catch this guy, > given that o365 is also a 'too big to block'.. > > Standard Paypal Phone Scam we have seen coming from PayPal's own > infrastructure.. But now via o365.. redaccted headers below.. > > (PayPal should have stopped this at the source long ago) > > Maybe someone from o365 can confirm this.. > > (Also, a duplicate Return-Path problem) > > Return-Path: <bounces+srs=9yaro=td@highlandspark.store> > Received: from mail-psaapc01lp2042.outbound.protection.outlook.com (HELO > APC01-PSA-obe.outbound.protection.outlook.com) (104.47.26.42) > by be.cityemail.com with (TLS_AES_256_GCM_SHA384 encrypted) ESMTPS > (8698d6c0-b705-11ef-8ed5-4730eb8cb971); Tue, 10 Dec 2024 06:46:24 -0800 > Received: from SEZPR04MB6682.apcprd04.prod.outlook.com (2603:1096:101:e3::14) > by KL1PR0401MB6465.apcprd04.prod.outlook.com (2603:1096:820:9d::8) with > Microsoft SMTP Server (version=TLS1_2, > cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8207.24; Tue, 10 Dec > 2024 14:46:10 +0000 > Received: from JH0PR04MB7411.apcprd04.prod.outlook.com (2603:1096:990:47::6) > by SEZPR04MB6682.apcprd04.prod.outlook.com (2603:1096:101:e3::14) with > Microsoft SMTP Server (version=TLS1_2, > cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8230.18; Tue, 10 Dec > 2024 14:45:59 +0000 > Received: from JH0PR04MB7411.apcprd04.prod.outlook.com > ([fe80::f384:c663:7c1c:c4f1]) by JH0PR04MB7411.apcprd04.prod.outlook.com > ([fe80::f384:c663:7c1c:c4f1%2]) with mapi id 15.20.8230.016; Tue, 10 Dec 2024 > 14:45:58 +0000 > Received: from SG2PR02CA0015.apcprd02.prod.outlook.com (2603:1096:3:17::27) by > KL1PR04MB7210.apcprd04.prod.outlook.com (2603:1096:820:fe::7) with Microsoft > SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id > 15.20.8230.19; Tue, 10 Dec 2024 13:40:13 +0000 > Received: from SG2PEPF000B66CA.apcprd03.prod.outlook.com > (2603:1096:3:17:cafe::8a) by SG2PR02CA0015.outlook.office365.com > (2603:1096:3:17::27) with Microsoft SMTP Server (version=TLS1_3, > cipher=TLS_AES_256_GCM_SHA384) id 15.20.8230.15 via Frontend Transport; Tue, > 10 Dec 2024 13:40:13 +0000 > Authentication-Results: spf=pass (sender IP is 173.0.84.234) > smtp.mailfrom=paypal.com; dkim=pass (signature was verified) > header.d=paypal.com;dmarc=pass action=none header.from=paypal.com; > Received-SPF: Pass (protection.outlook.com: domain of paypal.com designates > 173.0.84.234 as permitted sender) receiver=protection.outlook.com; > client-ip=173.0.84.234; helo=mx10.slc.paypal.com; pr=C > Received: from mx10.slc.paypal.com (173.0.84.234) by > SG2PEPF000B66CA.mail.protection.outlook.com (10.167.240.22) with Microsoft > SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id > 15.20.8230.7 via Frontend Transport; Tue, 10 Dec 2024 13:40:12 +0000 > DKIM-Signature: v=1; a=rsa-sha256; d=paypal.com; s=pp-dkim1; > c=relaxed/relaxed; > q=dns/txt; i=@paypal.com; t=1733837110; > h=From:From:Subject:Date:To:MIME-Version:Content-Type; > bh=4Bo+xEAj0oIFcgcXBsH4ZnETeria/8Hb5NVyfSlIlRE=; > b=J9gaiwmVtu2IwmWXt/DLX1M2PT1cqg2QgfzcQL0bjGpEjM+qf1bZKNquNonM0yUy > A5kq/qTWa0nVF74UCu4H+fPmmPfCEZ8ay8c30nA8l8s4CTVgg1arwjUHxeO60ZZ7 > feTp3T41+M6qrsgFAGkGU6FGrmwucVCgtvhONS0vq3cNMwXvm7nMAuaSE45MPRsN > 22JVgGMW3zMAQZEMgz1euMlXcmlwFoI5rnXo28E6usdq/jpZR/jq2Cq9k5QJPEvF > XE5QUY1yA4CwEy+awtojNwsm/B22e7sKozUkWpJPRaElrkKIGUuSadGkk07c+oCM > ECqgrKIHXb8KaospjDRdag==; > Content-Transfer-Encoding: quoted-printable > Content-Type: text/html; charset="UTF-8" > Date: Tue, 10 Dec 2024 05:25:10 -0800 > Message-ID: <FD.55.64208.63148576@ccg13mail10> > MIME-Version: 1.0 > From: "serv...@paypal.com" <serv...@paypal.com> > To: "noreplies2@highlandspark. store" <noreplies2@highlandspark.store> > Subject: Invoice from JOHN WILLIAMS (0137) > X-MaxCode-Template: RT000238 > X-PP-Priority: 0-none-true > PP-Correlation-Id: f930175d3bf65 > X-PP-Email-transmission-Id: 2e2f0ff2-b6fa-11ef-bdeb-0580ea13bcaa > X-PP-REQUESTED-TIME: 1733837106251 > X-Email-Type-Id: RT000238 > AMQ-Delivery-Message-Id: nullval > X-XPT-XSL-Name: nullval > Return-Path: serv...@paypal.com > ..... > > > -- > "Catch the Magic of Linux..." > ------------------------------------------------------------------------ > Michael Peddemors, President/CEO LinuxMagic Inc. > Visit us at http://www.linuxmagic.com @linuxmagic > A Wizard IT Company - For More Info http://www.wizard.ca > "LinuxMagic" a Reg. TradeMark of Wizard Tower TechnoServices Ltd. > ------------------------------------------------------------------------ > 604-682-0300 Beautiful British Columbia, Canada > _______________________________________________ > mailop mailing list > mailop@mailop.org > https://list.mailop.org/listinfo/mailop
_______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop