Re: zellepay now seeing forwarding phishing

2025-02-12 Thread John Hardin
On Tue, 11 Feb 2025, Kris Deugau wrote: John Hardin wrote: On Mon, 10 Feb 2025, John Hardin wrote: I just got a forwarded-via-outlook phish for zellepay that looks just like the paypal phishes... Ah, not *quite* the same. Zellepay doesn't have their own MTA infrastructure, so it's a *l

Re: zellepay now seeing forwarding phishing

2025-02-11 Thread Kris Deugau
John Hardin wrote: On Mon, 10 Feb 2025, John Hardin wrote: I just got a forwarded-via-outlook phish for zellepay that looks just like the paypal phishes... Ah, not *quite* the same. Zellepay doesn't have their own MTA infrastructure, so it's a *little* less obvious. Initial rules checked i

Re: zellepay now seeing forwarding phishing

2025-02-10 Thread John Hardin
On Mon, 10 Feb 2025, John Hardin wrote: I just got a forwarded-via-outlook phish for zellepay that looks just like the paypal phishes... Ah, not *quite* the same. Zellepay doesn't have their own MTA infrastructure, so it's a *little* less obvious. Initial rules checked in. -- John Hardin

zellepay now seeing forwarding phishing

2025-02-10 Thread John Hardin
I just got a forwarded-via-outlook phish for zellepay that looks just like the paypal phishes... "If you did not authorize this, please call us immediately at-I(888) 592-O36I to secure your account and recover your funds." Will add rules tonight. -- John Hardin KA7OHZ

Patch: add support of Phishing Database

2024-12-16 Thread Kirill A . Korinsky
Greetings, I'd like to share a patch which added to Phishing.pm one more source: so-called Phishing Database. Details here: https://github.com/mitchellkrogza/Phishing.Database diff --git a/lib/Mail/SpamAssassin/Plugin/Phishing.pm b/lib/Mail/SpamAssassin/Plugin/Phishing.pm index 310d

Re: [External] Paypal phishing?

2024-11-21 Thread Bill Cole
alk to them so they can figure out what provider(s) are facilitating this. Regards, KAM On 11/21/2024 7:57 AM, AJ Weber wrote: I saw a "conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't recall if anyone found a reasonable solut

Re: [External] Paypal phishing?

2024-11-21 Thread Bill Cole
contain a phone number to >> call. >> >> Side note: Any one got a good contact at the FCC? I've been wanting to talk >> to them so they can figure out what provider(s) are facilitating this. >> >> Regards, >> >> KAM >> >> On 11/2

Re: [External] Paypal phishing?

2024-11-21 Thread Kevin A. McGrail
can figure out what provider(s) are facilitating this. Regards, KAM On 11/21/2024 7:57 AM, AJ Weber wrote: I saw a "conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't recall if anyone found a reasonable solution (or new rules).

Re: Paypal phishing?

2024-11-21 Thread Benny Pedersen
AJ Weber skrev den 2024-11-21 13:57: I saw a "conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't recall if anyone found a reasonable solution (or new rules). I just received one and it seems very well crafted.  Is anyone st

Re: Paypal phishing - ADDL NOTES

2024-11-21 Thread AJ Weber
I coincidentally have a legit PP email/notification from just a day ago.  Some things to note: LEGIT: X-Spam-DCC:www.nova53.net: app3 1207; Body=1 Fuz1=1 Fuz2=1 From:"serv...@paypal.com" To: AW Subject: You authorized a payment to ((To is actually my email address)) FAKES: X-Spam-DCC:www.n

Re: Paypal phishing?

2024-11-21 Thread AJ Weber
2.5 Let me know how this works for you. -- Jared Hall ja...@jaredsec.com Available for hire. On 11/21/2024 7:57 AM, AJ Weber wrote: I saw a "conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't recall if anyone found a

Re: [External] Paypal phishing?

2024-11-21 Thread AJ Weber
he FCC? I've been wanting to talk to them so they can figure out what provider(s) are facilitating this. Regards, KAM On 11/21/2024 7:57 AM, AJ Weber wrote: I saw a "conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't rec

Re: [External] Paypal phishing?

2024-11-21 Thread AJ Weber
ain a phone number to call. Side note: Any one got a good contact at the FCC? I've been wanting to talk to them so they can figure out what provider(s) are facilitating this. Regards, KAM On 11/21/2024 7:57 AM, AJ Weber wrote: I saw a "conversation" a few weeks ago regarding

Re: Paypal phishing?

2024-11-21 Thread Jared Hall via users
On 11/21/2024 7:57 AM, AJ Weber wrote: I saw a "conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't recall if anyone found a reasonable solution (or new rules). BOLO for my email. That is the complete PayPal stanza from Ja

Re: [External] Paypal phishing?

2024-11-21 Thread Kevin A. McGrail
quot;conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't recall if anyone found a reasonable solution (or new rules). I just received one and it seems very well crafted.  Is anyone still collecting samples and wants this one too?

Paypal phishing?

2024-11-21 Thread AJ Weber
I saw a "conversation" a few weeks ago regarding paypal phishing emails that were not being caught. I can't recall if anyone found a reasonable solution (or new rules). I just received one and it seems very well crafted.  Is anyone still collecting samples and wants this one to

Re: Mail::SpamAssassin::Plugin::Phishing PhishStats[.]info domain expired

2024-06-24 Thread giovanni
On 6/23/24 10:26 PM, Larry Nedry via users wrote: On 7/21/23 9:10 AM, Giovanni Bechis wrote: Hi, phishstats[.]info domain has recently moved to a parking domain, if you are using Mail::SpamAssassin::Plugin::Phishing plugin with data downloaded from PhishStats[.]info it would be better to

Re: Mail::SpamAssassin::Plugin::Phishing PhishStats[.]info domain expired

2024-06-23 Thread Larry Nedry via users
On 7/21/23 9:10 AM, Giovanni Bechis wrote: Hi, phishstats[.]info domain has recently moved to a parking domain, if you are using Mail::SpamAssassin::Plugin::Phishing plugin with data downloaded from PhishStats[.]info it would be better to comment "phishing_phishstats_feed" configur

Re: Getting phishing from sender in 60_welcomelist_auth.cf

2023-10-12 Thread Bill Cole
45:15 UTC-0400 (Wed, 11 Oct 2023 16:45:15 -0400) Ricky Boone is rumored to have said: Just a heads up, it appears that usssa[.]com has had their SendGrid email sending account popped, and a bad actor has been sending phishing emails from it. The domain is defined in 60_welcomelist

Re: Getting phishing from sender in 60_welcomelist_auth.cf

2023-10-12 Thread Ricky Boone
ill Cole > > wrote: > >> > >> On 2023-10-11 at 16:45:15 UTC-0400 (Wed, 11 Oct 2023 16:45:15 -0400) > >> Ricky Boone > >> is rumored to have said: > >> > >>> Just a heads up, it appears that usssa[.]com has had their SendGrid > >

Re: Getting phishing from sender in 60_welcomelist_auth.cf

2023-10-12 Thread Bill Cole
023-10-11 at 16:45:15 UTC-0400 (Wed, 11 Oct 2023 16:45:15 -0400) Ricky Boone is rumored to have said: Just a heads up, it appears that usssa[.]com has had their SendGrid email sending account popped, and a bad actor has been sending phishing emails from it. The domain is defined

Re: Getting phishing from sender in 60_welcomelist_auth.cf

2023-10-11 Thread Ricky Boone
23 at 9:25 PM Bill Cole wrote: > > On 2023-10-11 at 16:45:15 UTC-0400 (Wed, 11 Oct 2023 16:45:15 -0400) > Ricky Boone > is rumored to have said: > > > Just a heads up, it appears that usssa[.]com has had their SendGrid > > email sending account popped, and a bad act

Re: Getting phishing from sender in 60_welcomelist_auth.cf

2023-10-11 Thread Bill Cole
On 2023-10-11 at 16:45:15 UTC-0400 (Wed, 11 Oct 2023 16:45:15 -0400) Ricky Boone is rumored to have said: Just a heads up, it appears that usssa[.]com has had their SendGrid email sending account popped, and a bad actor has been sending phishing emails from it. The domain is defined in

Getting phishing from sender in 60_welcomelist_auth.cf

2023-10-11 Thread Ricky Boone
Just a heads up, it appears that usssa[.]com has had their SendGrid email sending account popped, and a bad actor has been sending phishing emails from it. The domain is defined in 60_welcomelist_auth.cf with def_welcomelist_auth/def_whitelist_auth entries with *@*.usssa.com.

Re: (Re-)emergence of UTF based obfuscation in phishing/spam

2023-08-30 Thread Ricky Boone
Typo, I meant to say I was on SA 3.4.6. On Wed, Aug 30, 2023, 3:22 PM Ricky Boone wrote: > Something I noticed on a set of emails that were reported to me. > > I have custom rules to look out for certain names in From:name. The > messages should have been caught by them, however upon inspection

(Re-)emergence of UTF based obfuscation in phishing/spam

2023-08-30 Thread Ricky Boone
Something I noticed on a set of emails that were reported to me. I have custom rules to look out for certain names in From:name. The messages should have been caught by them, however upon inspection the name was UTF-8 encoded, and included a character that doesn't seem to render, but interferes w

Mail::SpamAssassin::Plugin::Phishing PhishStats[.]info domain expired

2023-07-21 Thread Giovanni Bechis
Hi, phishstats[.]info domain has recently moved to a parking domain, if you are using Mail::SpamAssassin::Plugin::Phishing plugin with data downloaded from PhishStats[.]info it would be better to comment "phishing_phishstats_feed" configuration line. If PhishStats[.]info will not

Re: Phishing from domain present in USER_IN_DEF_SPF_WL

2023-05-23 Thread Bill Cole
On 2023-05-23 at 12:08:10 UTC-0400 (Tue, 23 May 2023 18:08:10 +0200) Thierry is rumored to have said: > Hi, > > we just received phishing spams (Postfinance) from zendesk.com > > This domain is present in 60_welcomelist_auth.cf for the rule > USER_IN_DEF_SPF_WL > > Ca

Phishing from domain present in USER_IN_DEF_SPF_WL

2023-05-23 Thread Thierry
Hi, we just received phishing spams (Postfinance) from zendesk.com This domain is present in 60_welcomelist_auth.cf for the rule USER_IN_DEF_SPF_WL Can you remove this domain (temporarily or permanently) next update ? Received: from outbyoip4.pod19.use1.zdsys.com (outbyoip4.pod19.use1

Re: Dropbox invoice phishing

2023-03-20 Thread jason hirsh
Technically you pommel m > On Mar 20, 2023, at 5:34 PM, Mark London wrote: > > Dropbox now has an invoice feature, that allows you to create a customized > invoice. So what this person did was to create an invoice that looks like > it’s coming from PayPal. Except for the fact that the From

Dropbox invoice phishing

2023-03-20 Thread Mark London
Dropbox now has an invoice feature, that allows you to create a customized invoice. So what this person did was to create an invoice that looks like it’s coming from PayPal. Except for the fact that the From address shows it is coming from Dropbox. Months ago I saw a similar problem with f

Re: May I get to 0 phishing?

2023-02-23 Thread Matus UHLAR - fantomas
On 21.02.23 19:51, hg user wrote: I was wondering if it is possible to reach the goal of 0 phishing. With 2 layers of paid protection, and a third layer realized with spamassassin with a lot of hand made rules, I'm able to catch a lot of spam and if some reaches the mailboxes, no problem.

Re: adobe phishing?

2023-02-22 Thread Greg Troxel
Kris Deugau writes: > Greg Troxel wrote: >> One of my users got mail that really looks like a phish. They are >> unaware of having an adobe account. It is DKIM signed, but looks a bit >> spammy in terms of the content (low-quality HTML markup, missing >> text/plain content). > > ... How much ot

Re: adobe phishing?

2023-02-22 Thread Erik de Castro Lopo
Kris Deugau wrote: > The decoded Subject: might provide more of a hint to whatever > Adobe-borged software the user actually had an account for. Subject decodes to: "Important information about your Adobe account" Erik -- -- E

Re: adobe phishing?

2023-02-22 Thread Kris Deugau
Greg Troxel wrote: One of my users got mail that really looks like a phish. They are unaware of having an adobe account. It is DKIM signed, but looks a bit spammy in terms of the content (low-quality HTML markup, missing text/plain content). ... How much otherwise legitimate mail have you ins

adobe phishing?

2023-02-22 Thread Greg Troxel
One of my users got mail that really looks like a phish. They are unaware of having an adobe account. It is DKIM signed, but looks a bit spammy in terms of the content (low-quality HTML markup, missing text/plain content). Is anyone else seeing this? Opinions on if it's real, if adobe is compro

Re: May I get to 0 phishing?

2023-02-21 Thread Benny Pedersen
Rob McEwen skrev den 2023-02-21 23:17: I dug a little deeper on this. I'm pretty sure that FROM_PAYPAL_SPOOF is triggered at least in part by __NOT_SPOOFED being set to "false" - and DKIM failing does (or can) cause __NOT_SPOOFED to be false - and so in this case a failed DKIM validation, that mo

Re: May I get to 0 phishing?

2023-02-21 Thread Rob McEwen
pache.org Date 2/21/2023 4:53:27 PM Subject Re: May I get to 0 phishing? Benny, There are a few holes in your theory/assertions: (1) I know for a fact that this came from PayPal's official transactional servers, in PayPal's IP space. And while the sender (PayPal's customer) was a &quo

Re: May I get to 0 phishing?

2023-02-21 Thread Rob McEwen
of those were legit. Rob McEwen, invaluement -- Original Message -- From "Benny Pedersen" To users@spamassassin.apache.org Date 2/21/2023 4:03:31 PM Subject Re: May I get to 0 phishing? Rob McEwen skrev den 2023-02-21 20:37: https://pastebin.com/v80qMF99 Content

Re: May I get to 0 phishing?

2023-02-21 Thread Benny Pedersen
Rob McEwen skrev den 2023-02-21 20:37: https://pastebin.com/v80qMF99 Content preview: Invoice from Apple. com (0005) xxx...@example.com, here are your invoice details Hello, xxx...@example.com Here's your invoice Content analysis details: (1.2 points, 5.0 required) pts rule name

Re: May I get to 0 phishing?

2023-02-21 Thread Rob McEwen
Nope. That was a phishing spam, just maybe not the TYPE of phishing spam you're used to seeing? Calling it a fraud doesn't make it not a phish. When is a phishing spam ever NOT fraud? So what's the deciding factor? The fact that this claimed to be Apple sending an invoice vi

Re: May I get to 0 phishing?

2023-02-21 Thread hg user
I think this is not a phishing, more a fraud: it seems a real invoice for something you didn't buy. I'm glad to hear from experts that it's impossible to have 0 phishing, that I'm not missing the "silver bullet" or the magic token. I may perhaps implement ESP plugin

Re: May I get to 0 phishing?

2023-02-21 Thread Rob McEwen
What Bill Cole said! Agreed. For example, here's an almost impossible phish to block (at least, without blocking legitimate PayPal transactional emails!). This is a PayPal phishing spam, sent from PayPal's own server! It was sent by PayPal. I only changed the intended recipient a

Re: May I get to 0 phishing?

2023-02-21 Thread Bill Cole
On 2023-02-21 at 13:51:09 UTC-0500 (Tue, 21 Feb 2023 19:51:09 +0100) hg user is rumored to have said: I was wondering if it is possible to reach the goal of 0 phishing. Nope. There are people who find it profitable and they will continue to find ways to trick all the usable programmatic

May I get to 0 phishing?

2023-02-21 Thread hg user
I was wondering if it is possible to reach the goal of 0 phishing. With 2 layers of paid protection, and a third layer realized with spamassassin with a lot of hand made rules, I'm able to catch a lot of spam and if some reaches the mailboxes, no problem. But when phishing is able to reac

Re: How is this phishing attack called?

2023-02-15 Thread Jared Hall
On 2/15/2023 2:50 PM, hg user wrote: And how to intercept? From time to time we receive a message that is a reply-to to an old message, sometimes after months, with just several lines added at the top inviting to open a url or attachment. Has this kind of phishing a name? QakBot and

How is this phishing attack called?

2023-02-15 Thread hg user
And how to intercept? >From time to time we receive a message that is a reply-to to an old message, sometimes after months, with just several lines added at the top inviting to open a url or attachment. Has this kind of phishing a name? How can I prevent it or at least flag it for review? Th

gbhackers.com: Hackers Using New Obfuscation Mechanisms to Evade Detection Of Phishing Campaign

2021-08-16 Thread Brent Clark
Good day Guys Something I came across, and thought I would share / forward https://gbhackers.com/hackers-using-new-obfuscation-mechanisms-to-evade-detection-of-phishing-campaign/ Hope this helps. Regards Brent

Re: Email Phishing and Zloader: Redux

2021-07-12 Thread Jared Hall
1) Kenneth:  Uncomment the line in v343.  Rules in the present KAM.cf are thusly: ifplugin Mail::SpamAssassin::Plugin::OLEVBMacro   # increase number of mime parts checked   olemacro_num_mime 10   if (version >= 3.0040005)     body KAM_OLEMACRO eval:check_olemacro()     describe KAM_OLE

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-12 Thread Matus UHLAR - fantomas
--On Sunday, July 11, 2021 4:55 PM -0400 "Kevin A. McGrail" wrote: We use the olevbmacro detection added to SA. I would guess that's blocking the payload.I would guess that's blocking the payload. On 11.07.21 13:35, Kenneth Porter wrote: I see the plugin in the distribution but it doesn't a

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-12 Thread Matus UHLAR - fantomas
On 7/11/2021 5:11 PM, John Hardin wrote: "The other parts contain an application/vnd.ms-officetheme and an application/x-mso file. Which (in addition to the text/xml files) are used by Microsoft Word to load the embedded Word document." Would the presence of all three of those MIME types be a

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-12 Thread Pedro David Marco
>On Monday, July 12, 2021, 04:01:03 AM GMT+2, Kevin A. McGrail wrote: >If you can get me a spample, I'm sure I can tell you but in general we >block macros so that's all that's needed.  Likely the OLEVBMacro plugin >and KAM ruleset is blocking all of these already if you have the plugin

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-12 Thread Dominic Raferd
On 12/07/2021 07:40, Dave Funk wrote: On Sun, 11 Jul 2021, Kevin A. McGrail wrote: On 7/11/2021 5:11 PM, John Hardin wrote: "The other parts contain an application/vnd.ms-officetheme and an application/x-mso file. Which (in addition to the text/xml files) are used by Microsoft Word to load th

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread Dave Funk
On Sun, 11 Jul 2021, Kevin A. McGrail wrote: On 7/11/2021 5:11 PM, John Hardin wrote: "The other parts contain an application/vnd.ms-officetheme and an application/x-mso file. Which (in addition to the text/xml files) are used by Microsoft Word to load the embedded Word document." Would the

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread Kevin A. McGrail
On 7/11/2021 5:11 PM, John Hardin wrote: "The other parts contain an application/vnd.ms-officetheme and an application/x-mso file. Which (in addition to the text/xml files) are used by Microsoft Word to load the embedded Word document." Would the presence of all three of those MIME types be a

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread Kevin A. McGrail
It's in the KAM ruleset if that helps.  Search "ifplugin Mail::SpamAssassin::Plugin::OLEVBMacro" and you'll see the set of rules we use.  Add the plugin to an appropriate pre file to activate it. On 7/11/2021 4:35 PM, Kenneth Porter wrote: I see the plugin in the distribution but it doesn't app

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread John Hardin
On Sun, 11 Jul 2021, Kenneth Porter wrote: --On Sunday, July 11, 2021 1:20 PM -0400 Jared Hall wrote: The Word document (without macros) loads an external encrypted Excel file It has macros. It tricks the user into enabling and running them by telling him to enable the document for editin

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread Kenneth Porter
--On Sunday, July 11, 2021 4:55 PM -0400 "Kevin A. McGrail" wrote: We use the olevbmacro detection added to SA. I would guess that's blocking the payload.I would guess that's blocking the payload. I see the plugin in the distribution but it doesn't appear to be loaded by default and the ru

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread Kevin A. McGrail
We use the olevbmacro detection added to SA. I would guess that's blocking the payload.I would guess that's blocking the payload. On Sun, Jul 11, 2021, 15:00 Kenneth Porter wrote: > --On Sunday, July 11, 2021 1:20 PM -0400 Jared Hall > wrote: > > > The Word document (without macros) loads an e

Re: Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread Kenneth Porter
--On Sunday, July 11, 2021 1:20 PM -0400 Jared Hall wrote: The Word document (without macros) loads an external encrypted Excel file It has macros. It tricks the user into enabling and running them by telling him to enable the document for editing and enabling "content" (ie. macros). Hidin

Email Phishing and Zloader: Such a Disappointment

2021-07-11 Thread Jared Hall
otection Bypass".  I think not. A typical Microsoft Office user is "Joe Average", and good ol' Joe can't tell a ThreatPost from a Fencepost.  But five paragraphs down, this caught my eye: "The initial attack vector is inbox-based phishing messages with Word document

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-12 Thread John Hardin
On Mon, 12 Apr 2021, jwmi...@gmail.com wrote: John Hardin writes: > From: John Hardin > Date: Mon, 12 Apr 2021 07:29:03 -0700 (PDT) > > On Sun, 11 Apr 2021, Loren Wilton wrote: > > >> 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% > >> [score:

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-12 Thread jwmincy
John Hardin writes: > From: John Hardin > Date: Mon, 12 Apr 2021 07:29:03 -0700 (PDT) > > On Sun, 11 Apr 2021, Loren Wilton wrote: > > >> 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% > >> [score: 1.] > >> 0.5 BAYES_999

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-12 Thread Benny Pedersen
On 2021-04-12 16:29, John Hardin wrote: On Sun, 11 Apr 2021, Loren Wilton wrote: 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% [score: 1.] 0.5 BAYES_999 BODY: Bayes spam probability is 99.9 to 100%

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-12 Thread John Hardin
On Sun, 11 Apr 2021, Loren Wilton wrote: 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% [score: 1.] 0.5 BAYES_999 BODY: Bayes spam probability is 99.9 to 100% [score: 1.] I have 5.0 BAYES_99

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-12 Thread Matus UHLAR - fantomas
However, in 50_scores.cf, this line is commented out: #score RCVD_IN_SORBS_SPAM 0 0.5 0 0.5 Maybe that's the problem? no, there are other SORBS lists used: score RCVD_IN_SORBS_DUL 0 0.001 0 0.001 # n=0 n=2 score RCVD_IN_SORBS_HTTP 0 2.499 0 0.001 # n=0 n=2 score RCVD_IN_SORBS_MISC 0 # n=0 n=1

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-12 Thread Steve Dondley
However, in 50_scores.cf, this line is commented out: #score RCVD_IN_SORBS_SPAM 0 0.5 0 0.5 Maybe that's the problem? no, there are other SORBS lists used: score RCVD_IN_SORBS_DUL 0 0.001 0 0.001 # n=0 n=2 score RCVD_IN_SORBS_HTTP 0 2.499 0 0.001 # n=0 n=2 score RCVD_IN_SORBS_MISC 0 # n=0

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-12 Thread Matus UHLAR - fantomas
sorbs dnsbl missing, have you denied sorbs.net results ?, or is spamassassin not testing sorbs.net anymore ? On 11.04.21 18:22, Steve Dondley wrote: Best I can tell, my SA config should be testing for sorbs. I've got this line in /etc/spamassassin/v3220.pre: loadplugin Mail::SpamAssassin::Plu

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Kevin A. McGrail
If you have spamples for sharepoint phishes that evade kam ruleset, shoot me an email off-list to discuss getting me the spamples. On Sun, Apr 11, 2021, 16:43 Steve Dondley wrote: > On 2021-04-11 04:19 PM, Benny Pedersen wrote: > > On 2021-04-11 22:09, Steve Dondley wrote: > > > >> Content analy

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Loren Wilton
3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% [score: 1.] 0.5 BAYES_999 BODY: Bayes spam probability is 99.9 to 100% [score: 1.] I have 5.0 BAYES_99 BODY: Bayes spam probabilit

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Steve Dondley
sorbs dnsbl missing, have you denied sorbs.net results ?, or is spamassassin not testing sorbs.net anymore ? Best I can tell, my SA config should be testing for sorbs. I've got this line in /etc/spamassassin/v3220.pre: loadplugin Mail::SpamAssassin::Plugin::DNSEval And in /usr/share/spama

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Steve Dondley
Also, I've heard of sorbs over the years but I'm not sure exactly what it is. Is this the same block list run by Cisco? OK, I was getting SORBS confused with SenderBase Reputation Score (SBRS). That's the one run by Cisco, I believe. I actually have an account on the SORBS website that I s

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Steve Dondley
sorbs dnsbl missing, have you denied sorbs.net results ?, or is spamassassin not testing sorbs.net anymore ? How would I check if it's turned on? I tried grepping in /etc/spamassassin on "sorb" (case insensitive) and found nothing. So I guess it's not in my default config. I see many men

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Benny Pedersen
On 2021-04-11 22:43, Steve Dondley wrote: On 2021-04-11 04:19 PM, Benny Pedersen wrote: On 2021-04-11 22:09, Steve Dondley wrote: Content analysis details: (4.4 points, 5.0 required) pts rule name description -- ---

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Steve Dondley
On 2021-04-11 04:19 PM, Benny Pedersen wrote: On 2021-04-11 22:09, Steve Dondley wrote: Content analysis details: (4.4 points, 5.0 required) pts rule name description -- -- 3.5 BAYES_99 BO

Re: Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Benny Pedersen
On 2021-04-11 22:09, Steve Dondley wrote: Content analysis details: (4.4 points, 5.0 required) pts rule name description -- -- 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100%

Using spamassassin to thwart sharepoint phishing attacks

2021-04-11 Thread Steve Dondley
I've received about a dozen phishing attack emails from Microsoft's sharepoint service within the last couple of weeks. Only one of them was identified by SA as spam. After running the emails through sa-learn, they still only score a 4 to 4.5. But I could see that it would be easy

Re: Phishing campaign using email address to personalize URL

2021-02-23 Thread John Hardin
On Tue, 23 Feb 2021, Ricky Boone wrote: Seeing an interesting phishing campaign that appears to be personalizing components of the message and URL endpoints to potentially get around blacklists and other filters. Unfortunately I can't share the exact example publicly without effect

Re: Phishing campaign using email address to personalize URL

2021-02-23 Thread Benny Pedersen
On 2021-02-23 20:51, Ricky Boone wrote: * Examples I'm seeing have nearly blank message, and an HTML attachment with a JavaScript window.location.href redirect related to the attacker URL. * Attacker is leveraging SendGrid i have local clamav signature to catch html attachment inspiration fro

Phishing campaign using email address to personalize URL

2021-02-23 Thread Ricky Boone
Seeing an interesting phishing campaign that appears to be personalizing components of the message and URL endpoints to potentially get around blacklists and other filters. Unfortunately I can't share the exact example publicly without effectively recreating the email, but here's a

Re: Homoglyph spam/phishing targeting popular brands

2021-02-22 Thread Ricky Boone
7;m seeing it catch phrases like "pay pai", but with full context the phrase may be "...back pay paid out in...". Other than that, the rules are looking good. I've taken some of the examples and started new rules for other phishing words/phrases I'm seeing g

Re: Phishing campaign using nested Google redirect

2021-02-19 Thread John Hardin
On Fri, 19 Feb 2021, Giovanni Bechis wrote: On 2/19/21 1:09 AM, John Hardin wrote: On Thu, 18 Feb 2021, Giovanni Bechis wrote: On 2/18/21 6:37 PM, Ricky Boone wrote: Just wanted to forward an example of an interesting URL obfuscation tactic observed yesterday. https://www.google.com/url?sa=

Re: Phishing campaign using nested Google redirect

2021-02-19 Thread RW
On Thu, 18 Feb 2021 16:08:01 -0800 (PST) John Hardin wrote: > In our case it's best to upload an entire email (all headers intact > and with as little obfuscation as possible) to something like > Pastebin, then post the URL to that here so it can be downloaded. ... > For just URLs, though, examp

Re: Phishing campaign using nested Google redirect

2021-02-19 Thread Giovanni Bechis
On 2/19/21 1:09 AM, John Hardin wrote: > On Thu, 18 Feb 2021, Giovanni Bechis wrote: > >> On 2/18/21 6:37 PM, Ricky Boone wrote: >>> Just wanted to forward an example of an interesting URL obfuscation >>> tactic observed yesterday. >>> >>> https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web

Re: Phishing campaign using nested Google redirect

2021-02-18 Thread Ricky Boone
On Thu, Feb 18, 2021 at 7:08 PM John Hardin wrote: > > In our case it's best to upload an entire email (all headers intact and > with as little obfuscation as possible) to something like Pastebin, then > post the URL to that here so it can be downloaded. This keeps the spample > from being modifie

Re: Phishing campaign using nested Google redirect

2021-02-18 Thread John Hardin
On Thu, 18 Feb 2021, Giovanni Bechis wrote: On 2/18/21 6:37 PM, Ricky Boone wrote: Just wanted to forward an example of an interesting URL obfuscation tactic observed yesterday. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=15&url=https%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%

Re: Phishing campaign using nested Google redirect

2021-02-18 Thread John Hardin
On Thu, 18 Feb 2021, Ricky Boone wrote: Nice. I've copied scrubbed versions of what I've seen so far here: https://gitlab.com/-/snippets/2079108 (I can never remember if it is appropriate to include attachments to mailing lists like this). In our case it's best to upload an entire email (all

Re: Phishing campaign using nested Google redirect

2021-02-18 Thread Ricky Boone
Nice. I've copied scrubbed versions of what I've seen so far here: https://gitlab.com/-/snippets/2079108 (I can never remember if it is appropriate to include attachments to mailing lists like this). On Thu, Feb 18, 2021 at 1:13 PM Giovanni Bechis wrote: > > On 2/18/21 6:37 PM, Ricky Boone wrote

Re: Phishing campaign using nested Google redirect

2021-02-18 Thread Giovanni Bechis
On 2/18/21 6:37 PM, Ricky Boone wrote: > Just wanted to forward an example of an interesting URL obfuscation > tactic observed yesterday. > > https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=15&url=https%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%253A%252F%252Fwww.tehminadurranifoundati

Phishing campaign using nested Google redirect

2021-02-18 Thread Ricky Boone
Just wanted to forward an example of an interesting URL obfuscation tactic observed yesterday. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=15&url=https%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%253A%252F%252Fwww.tehminadurranifoundation.org%252F1%252F1%252Findex.php%26sa%3DD%26snt

Re: Homoglyph spam/phishing targeting popular brands

2021-02-17 Thread RW
On Wed, 17 Feb 2021 10:23:13 -0500 Jared Hall wrote: > On 2/16/2021 2:06 PM, RW wrote: > > I don't think there's much, if anything, in that module that > > benefits from being in perl. > Counts and amounts; even variable arithmetic amounts based on counts. > Everything else is just a regex. Y

Re: Homoglyph spam/phishing targeting popular brands

2021-02-17 Thread Jared Hall
On 2/16/2021 2:06 PM, RW wrote: That's not a bad idea, but if anyone is interested I'd suggest copying the character matching regexes into ordinary rules. Or better still into template tags, so that they can be reused in multiple rules. Agreed, RW.  Most of the stuff in there originated from rul

Re: Homoglyph spam/phishing targeting popular brands

2021-02-17 Thread Ricky Boone
Yep, so far so good. Thank you again for the pointers and creating the rules so quickly. On Tue, Feb 16, 2021 at 9:06 PM John Hardin wrote: > > On Tue, 16 Feb 2021, Ricky Boone wrote: > > > On Mon, Feb 15, 2021 at 12:16 AM John Hardin wrote: > >> > >> OK, I added FUZZY_OVERSTOCK as well, we'll

Re: Homoglyph spam/phishing targeting popular brands

2021-02-16 Thread John Hardin
On Tue, 16 Feb 2021, Ricky Boone wrote: On Mon, Feb 15, 2021 at 12:16 AM John Hardin wrote: OK, I added FUZZY_OVERSTOCK as well, we'll see what happens. If they don't perform well in masscheck you can always grab them out of my sandbox for your local rules. Masscheck results: https://ru

Re: Homoglyph spam/phishing targeting popular brands

2021-02-16 Thread Ricky Boone
On Mon, Feb 15, 2021 at 12:16 AM John Hardin wrote: > > OK, I added FUZZY_OVERSTOCK as well, we'll see what happens. > > If they don't perform well in masscheck you can always grab them out of my > sandbox for your local rules. > > Masscheck results: > >https://ruleqa.spamassassin.org/?rule=%2

Re: Homoglyph spam/phishing targeting popular brands

2021-02-16 Thread RW
On Mon, 15 Feb 2021 23:58:17 -0500 Jared Hall wrote: > > The CHAOS module *may* do what you want.  ...  It also has > detection for multiple Unicode Character Sets. That's not a bad idea, but if anyone is interested I'd suggest copying the character matching regexes into ordinary rules. Or bet

Re: Homoglyph spam/phishing targeting popular brands

2021-02-15 Thread Jared Hall
On 2/14/2021 9:58 PM, Ricky Boone wrote: On Sun, Feb 14, 2021 at 4:45 PM John Hardin wrote: On Sun, 14 Feb 2021, Ricky Boone wrote: What are the community's thoughts on handling spam/phishing that utilize homoglyphs to obfuscate the brands they're targeting? Are there any plugin

Re: Homoglyph spam/phishing targeting popular brands

2021-02-14 Thread John Hardin
On Sun, 14 Feb 2021, Ricky Boone wrote: On Sun, Feb 14, 2021 at 4:45 PM John Hardin wrote: How often do you see (over)stock and space obfuscated? So far, 4 times and once, respectively OK, I added FUZZY_OVERSTOCK as well, we'll see what happens. If they don't perform well in masscheck yo

Re: Homoglyph spam/phishing targeting popular brands

2021-02-14 Thread Ricky Boone
On Sun, Feb 14, 2021 at 4:45 PM John Hardin wrote: > > On Sun, 14 Feb 2021, Ricky Boone wrote: > > > What are the community's thoughts on handling spam/phishing that utilize > > homoglyphs to obfuscate the brands they're targeting? Are there any > > plugi

Re: Homoglyph spam/phishing targeting popular brands

2021-02-14 Thread John Hardin
On Sun, 14 Feb 2021, Ricky Boone wrote: What are the community's thoughts on handling spam/phishing that utilize homoglyphs to obfuscate the brands they're targeting? Are there any plugins that are in development that might assist with catching these? Take a look at the definit

  1   2   3   4   5   6   7   8   >