I have come across another wave of phishing emails, many of which
include toll-free numbers as the primary 'payload.'
These numbers seem to align with these gangs preferred telephony
platform, which is often RingCentral.
I have been reporting these incidents to *auditc...@ringcentral.com*.
If anyone has connections within RingCentral, this might be a good
opportunity to address their platform being used as a tool for these
schemes.
Keith
On 12/13/2024 4:02 PM, Mark Alley via mailop wrote:
The changes to EXO on SRS were relatively recent, back in 2021.
https://learn.microsoft.com/en-us/exchange/reference/sender-rewriting-scheme
- Mark Alley
On 12/13/2024 3:34 PM, Louis via mailop wrote:
Interesting! I'm surprised they forward email that fails SPF at all.
Is that mostly a legacy thing? You don't see much legitimate email
that fails SPF nowadays.
Groetjes,
Louis
On Friday, December 13, 2024 10:01 PM, Mark Alley via mailop
<mailop@mailop.org> wrote:
Based on what I'm seeing in those headers, SRS did not happen
because it did not satisfy the conditions to have it apply.
SRS will only apply if SPF passed authentication at the time
Exchange Online (EXO) received it. If it failed SPF auth, EXO
won't rewrite the RFC5321.mailfrom to preserve the failed result.
- Mark Alley
On 12/13/2024 2:36 PM, Jarland Donnell via mailop wrote:
Sorry if I missed part of the discussion, but now they're
circumventing the SRS headers and Microsoft is straight up
spoofing PayPal envelope senders. First catch of this for me was
today. Here's a look: https://mxbin.io/89sXAc
The logs showing the envelope sender quite clearly as well:
2024-12-13 19:22:25 1tMBF2-0000000F7eV-386r <=
serv...@paypal.com
H=mail-koreacentralazlp17013079.outbound.protection.outlook.com
(SEYPR02CU001.outbound.protection.outlook.com) [40.93.138.79]
P=esmtps X=TLS1.3:TLS_AES_256_GCM_SHA384:256 CV=no S=51168
DKIM=paypal.com id=CE.66.22381.7B87C576@ccg01mail10 T="You've
got a money request" from <serv...@paypal.com> for
jarl...@mxroute.com
Someone at Microsoft needs to get on this ASAP, and PayPal needs
to have more faith in their SPF record and trade that soft fail.
This is looking pretty bad. I'm considering this a friendly
nudge to anyone watching this mailing list from both companies.
On 2024-12-10 10:33, Michael Peddemors via mailop wrote:
Ouch.. getting even harder for recipient spam protections to
catch this guy, given that o365 is also a 'too big to block'..
Standard Paypal Phone Scam we have seen coming from PayPal's
own infrastructure.. But now via o365.. redaccted headers below..
(PayPal should have stopped this at the source long ago)
Maybe someone from o365 can confirm this..
(Also, a duplicate Return-Path problem)
Return-Path: <bounces+srs=9yaro=td@highlandspark.store>
Received: from
mail-psaapc01lp2042.outbound.protection.outlook.com (HELO
APC01-PSA-obe.outbound.protection.outlook.com) (104.47.26.42)
by be.cityemail.com with (TLS_AES_256_GCM_SHA384
encrypted) ESMTPS
(8698d6c0-b705-11ef-8ed5-4730eb8cb971); Tue, 10 Dec 2024
06:46:24 -0800
Received: from SEZPR04MB6682.apcprd04.prod.outlook.com
(2603:1096:101:e3::14)
by KL1PR0401MB6465.apcprd04.prod.outlook.com
(2603:1096:820:9d::8) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.8207.24; Tue, 10 Dec
2024 14:46:10 +0000
Received: from JH0PR04MB7411.apcprd04.prod.outlook.com
(2603:1096:990:47::6)
by SEZPR04MB6682.apcprd04.prod.outlook.com
(2603:1096:101:e3::14) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.8230.18; Tue, 10 Dec
2024 14:45:59 +0000
Received: from JH0PR04MB7411.apcprd04.prod.outlook.com
([fe80::f384:c663:7c1c:c4f1]) by
JH0PR04MB7411.apcprd04.prod.outlook.com
([fe80::f384:c663:7c1c:c4f1%2]) with mapi id 15.20.8230.016;
Tue, 10 Dec 2024
14:45:58 +0000
Received: from SG2PR02CA0015.apcprd02.prod.outlook.com
(2603:1096:3:17::27) by
KL1PR04MB7210.apcprd04.prod.outlook.com (2603:1096:820:fe::7)
with Microsoft
SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.8230.19; Tue, 10 Dec 2024 13:40:13 +0000
Received: from SG2PEPF000B66CA.apcprd03.prod.outlook.com
(2603:1096:3:17:cafe::8a) by SG2PR02CA0015.outlook.office365.com
(2603:1096:3:17::27) with Microsoft SMTP Server (version=TLS1_3,
cipher=TLS_AES_256_GCM_SHA384) id 15.20.8230.15 via Frontend
Transport; Tue,
10 Dec 2024 13:40:13 +0000
Authentication-Results: spf=pass (sender IP is 173.0.84.234)
smtp.mailfrom=paypal.com; dkim=pass (signature was verified)
header.d=paypal.com;dmarc=pass action=none
header.from=paypal.com;
Received-SPF: Pass (protection.outlook.com: domain of
paypal.com designates
173.0.84.234 as permitted sender)
receiver=protection.outlook.com;
client-ip=173.0.84.234; helo=mx10.slc.paypal.com; pr=C
Received: from mx10.slc.paypal.com (173.0.84.234) by
SG2PEPF000B66CA.mail.protection.outlook.com (10.167.240.22)
with Microsoft
SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.8230.7 via Frontend Transport; Tue, 10 Dec 2024 13:40:12
+0000
DKIM-Signature: v=1; a=rsa-sha256; d=paypal.com; s=pp-dkim1;
c=relaxed/relaxed;
q=dns/txt; i=@paypal.com; t=1733837110;
h=From:From:Subject:Date:To:MIME-Version:Content-Type;
bh=4Bo+xEAj0oIFcgcXBsH4ZnETeria/8Hb5NVyfSlIlRE=;
b=J9gaiwmVtu2IwmWXt/DLX1M2PT1cqg2QgfzcQL0bjGpEjM+qf1bZKNquNonM0yUy
A5kq/qTWa0nVF74UCu4H+fPmmPfCEZ8ay8c30nA8l8s4CTVgg1arwjUHxeO60ZZ7
feTp3T41+M6qrsgFAGkGU6FGrmwucVCgtvhONS0vq3cNMwXvm7nMAuaSE45MPRsN
22JVgGMW3zMAQZEMgz1euMlXcmlwFoI5rnXo28E6usdq/jpZR/jq2Cq9k5QJPEvF
XE5QUY1yA4CwEy+awtojNwsm/B22e7sKozUkWpJPRaElrkKIGUuSadGkk07c+oCM
ECqgrKIHXb8KaospjDRdag==;
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="UTF-8"
Date: Tue, 10 Dec 2024 05:25:10 -0800
Message-ID: <FD.55.64208.63148576@ccg13mail10>
MIME-Version: 1.0
From: "serv...@paypal.com" <serv...@paypal.com>
To: "noreplies2@highlandspark. store"
<noreplies2@highlandspark.store>
Subject: Invoice from JOHN WILLIAMS (0137)
X-MaxCode-Template: RT000238
X-PP-Priority: 0-none-true
PP-Correlation-Id: f930175d3bf65
X-PP-Email-transmission-Id: 2e2f0ff2-b6fa-11ef-bdeb-0580ea13bcaa
X-PP-REQUESTED-TIME: 1733837106251
X-Email-Type-Id: RT000238
AMQ-Delivery-Message-Id: nullval
X-XPT-XSL-Name: nullval
Return-Path: serv...@paypal.com
.....
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop
--
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop