This is my reading of it.

- You may have received an e-mail addressed to someone-else.
I do not know your setup, but this is what it looks like from my seat.
(Sent "To" [@puffin.net](mailto:bait_sa_e3npnogbtq1d4...@puffin.net), but 
"Received: from" futurequest.net.)
We have a custom rule for this junk. In general, if you domain is
example.com and your server receives e-mail to whatever.com,
then you can reject it by local policy.

header __LOCAL_DOMAIN To:raw =~ /\@yourdomain\.com/
meta     T_FD ( !__LOCAL_DOMAIN )
describe T_FD To: foreign domain
score    T_FD 5.0

- From:domain mismatches Received:domain
- Return-Path: missing header
These are not a hard symptom of spam, but we give them a 0.5 penalty anyway.

- Received: from domain literal
Well-behaved servers, with state-of-the-art DNS and well implemented
SPF, DKIM and DMARC, they have domain name. They also cut out
the first hop, from the client to the server.
We give a full 1.0 penalty here.

-  Body: attachment without introductory text
I do not have a rule for this, yet.

The default SA returns the following:
0.0 TVD_SPACE_RATIO        No description available.
0.0 TVD_SPACE_RATIO_MINFP  Space ratio

Our SA returns a big fat spam flag.

RG

Sent with [ProtonMail](https://protonmail.com) Secure Email.

> -------- Original Message --------
> Subject: spample: Microsoft Office DDE exploit (in OpenXML attachment)
> Local Time: 31 October 2017 7:10 AM
> UTC Time: 31 October 2017 06:10
> From: sa_c...@iowahoneypot.com
> To: users@spamassassin.apache.org
>
> Starting Monday late pm (Iowa time), I've been seeing my first DDE
> exploits, with significant volume.
> Here's a spample, with only the account part of the To header munged:
> http://puffin.net/software/spam/samples/0056_dde_auto.txt
>
> The MIME part Content Types are all of the same form, with only the
> nine (9) digit long invoice number being different (same as used in
> the Subject). The date part is changing correctly.
> So far, there's enough consistency there that it may be worth some
> quick rules.
>
> Here's a few of the Message-IDs:
> adr12896529648910347634474919b240d844eabec6a20f80...@canadianchemistry.ca
> adr7620524563497929668713350304233e03d64b1f8e8170...@rapidtest.ca
> adr68345885946016552575674219fe1b08f91debc7cfbb00...@allaharassociates.com
> adr876830136506609450916689649c89a27b537895370760...@imed-deltona.com
> adr426090832862978264036549945af7e4fe88b447543d90...@nationaleducationcouncil.com
> adr99440411731938631057549731c1c2a892fde297bf3f20...@wmacsolutions.com
> adr81956121236541247090766988290f5afbfdda13822ad0...@sofiamartindecoracion.es
> adr67473153783778389876391568ca7d883cc6de0610e100...@radiantsolutions.net
> adr26027147591253901902363379be430bba9cf219fd34a0...@aard.nl
> adr131945596038997342794846233353a6ec4959eaf2ab90...@zwart-holding.nl
> adr9656904421970779346632739481be4f2cff28e0788560...@edusophia.org
> adr73468520213265525945855867cfcfcd9887a98f9244f0...@osasgranitbutik.se
> In all cases, the domain matches the domain in the From header.
>
> So far, the From has always been in the form:
> Invoicing invoic...@example.com
>
> The only SA rules that they're all hitting are:
> TVD_SPACE_RATIO
> TVD_SPACE_RATIO_MINFP
>
> Internally, these were NOT as I was expecting.
> When the buzz about DDE first broke, I was expecting old style doc,
> rtf, and ics (calendar) files, and restricted my rules to those.
> Today's wave are all OpenXML, and the payload is in file
> "word/document.xml".
>
> If you take a close look at just the contents of "<w:instrText>"
> tag pairs, it appears they can easily obfuscate the payload. :(
>
> I need to do a LOT more reading, but for now, I've added
> seat-of-my-pants rules for exact word matches on:
> DDE
> instrText
> AUTO
> gfxdata
>
> So far, using an older (v3.4.1) plain vanilla SA setup, my
> killrate with Bayes is 48% (without Bayes, it would have been
> about 30.4%).
>
> My post SA filter has been killing them all, but that's due to my
> aggressive rules and a bit of luck.
> I've asked one of my people with less aggressive rules and more
> diverse ham to run some ham-only MassChecks using the above rules.
> I'll share the results.
>
> Has anyone seen the RTF or Calendar/.ics forms of this exploit?
> If so, please-please-please post a spample.
> - "Chip"

Reply via email to