Starting Monday late pm (Iowa time), I've been seeing my first DDE
exploits, with significant volume.
Here's a spample, with only the account part of the To header munged:
        http://puffin.net/software/spam/samples/0056_dde_auto.txt

The MIME part Content Types are all of the same form, with only the 
nine (9) digit long invoice number being different (same as used in
the Subject).  The date part is changing correctly.
So far, there's enough consistency there that it may be worth some
quick rules.

Here's a few of the Message-IDs:
        
<adr12896529648910347634474919b240d844eabec6a20f80...@canadianchemistry.ca>
        <adr7620524563497929668713350304233e03d64b1f8e8170...@rapidtest.ca>
        
<adr68345885946016552575674219fe1b08f91debc7cfbb00...@allaharassociates.com>
        <adr876830136506609450916689649c89a27b537895370760...@imed-deltona.com>
        
<adr426090832862978264036549945af7e4fe88b447543d90...@nationaleducationcouncil.com>
        <adr99440411731938631057549731c1c2a892fde297bf3f20...@wmacsolutions.com>
        
<adr81956121236541247090766988290f5afbfdda13822ad0...@sofiamartindecoracion.es>
        
<adr67473153783778389876391568ca7d883cc6de0610e100...@radiantsolutions.net>
        <adr26027147591253901902363379be430bba9cf219fd34a0...@aard.nl>
        <adr131945596038997342794846233353a6ec4959eaf2ab90...@zwart-holding.nl>
        <adr9656904421970779346632739481be4f2cff28e0788560...@edusophia.org>
        
<adr73468520213265525945855867cfcfcd9887a98f9244f0...@osasgranitbutik.se>
In all cases, the domain matches the domain in the From header.

So far, the From has always been in the form:
        Invoicing <invoic...@example.com>

The only SA rules that they're all hitting are:
        TVD_SPACE_RATIO
        TVD_SPACE_RATIO_MINFP

Internally, these were _NOT_ as I was expecting.
When the buzz about DDE first broke, I was expecting old style doc,
rtf, and ics (calendar) files, and restricted my rules to those.
Today's wave are all OpenXML, and the payload is in file
"word/document.xml".

If you take a close look at just the contents of "<w:instrText>"
tag pairs, it appears they can easily obfuscate the payload. :(

I need to do a _LOT_ more reading, but for now, I've added 
seat-of-my-pants rules for exact word matches on:
        DDE
        instrText
        AUTO
        gfxdata

So far, using an older (v3.4.1) plain vanilla SA setup, my 
killrate with Bayes is 48% (without Bayes, it would have been 
about 30.4%).

My post SA filter has been killing them all, but that's due to my
aggressive rules and a bit of luck.
I've asked one of my people with less aggressive rules and more 
diverse ham to run some ham-only MassChecks using the above rules.
I'll share the results.

Has anyone seen the RTF or Calendar/.ics forms of this exploit?
If so, please-please-please post a spample.
        - "Chip"


Reply via email to