Re: [mailop] SPF exploited with Mimecast & DMARC reject

2024-12-06 Thread Mark Alley via mailop
I got a copy of the actual message from Alex; it's a classic case of BEC (Business Email Compromise). The sender's email account was compromised due to being successfully phished or similarly via session hijacking (evilginx). TA then used the credentials and/or hijacked session to send email

Re: [mailop] SPF exploited with Mimecast & DMARC reject

2024-12-06 Thread Mark Alley via mailop
I guess that brings up another question that's unclear - was this message from the org's Mimecast actually determined to be malicious? Based on the information available, it just sounds like someone at the organization sent Alex a (valid?) encrypted attachment from their Secure Messaging portal

Re: [mailop] SPF exploited with Mimecast & DMARC reject

2024-12-06 Thread Alex Shakhov | SH Consulting via mailop
I was also wondering if it was something like this... See the header below. The spoofed domain was modified and replaced with 'example.com'. Delivered-To: a...@theshcompany.com Received: by 2002:a05:6020:ac0d:b0:310:9e0c:1a53 with SMTP id nx13csp334454wdb; Wed, 4 Dec 2024 07:35:3

Re: [mailop] SPF exploited with Mimecast & DMARC reject

2024-12-06 Thread Faisal Misle via mailop
I'd love to see redacted headers. I wonder if it's similar to the Proofpoint bypass that was in the news a few cycles ago where any 365 tenant can email through companies that have PFPT setup. On 12/6/24 1:43 PM, Alex Shakhov | SH Consulting via mailop wrote: Hello, a few months ago, I was aske

Re: [mailop] SPF exploited with Mimecast & DMARC reject

2024-12-06 Thread Mark Alley via mailop
On 12/6/2024 6:43 AM, Alex Shakhov | SH Consulting via mailop wrote: Hello, a few months ago, I was asked to audit emails and integrate a new system for a company. The first thing I did was configure DMARC reporting (replaced v=DMARC1; p=none;) and after two months of analyzing their email tra