Addenda: > From: Invoicing <invoic...@canadianchemistry.ca>
>unbound-host -rvD canadianchemistry.ca canadianchemistry.ca has address 168.144.155.97 (insecure) canadianchemistry.ca has no IPv6 address (insecure) canadianchemistry.ca mail is handled by 0 canadianchemistry-ca.mail.protection.outlook.com. (insecure) > Received: from .... not from Microsoft SPF should fail hard here. RG Sent with [ProtonMail](https://protonmail.com) Secure Email. > -------- Original Message -------- > Subject: Re: spample: Microsoft Office DDE exploit (in OpenXML attachment) > Local Time: 31 October 2017 11:49 AM > UTC Time: 31 October 2017 10:49 > From: r...@protonmail.com > To: Chip M. <sa_c...@iowahoneypot.com> > users@spamassassin.apache.org <users@spamassassin.apache.org> > > This is my reading of it. > > - You may have received an e-mail addressed to someone-else. > I do not know your setup, but this is what it looks like from my seat. > (Sent "To" [@puffin.net](mailto:bait_sa_e3npnogbtq1d4...@puffin.net), but > "Received: from" futurequest.net.) > We have a custom rule for this junk. In general, if you domain is > example.com and your server receives e-mail to whatever.com, > then you can reject it by local policy. > > header __LOCAL_DOMAIN To:raw =~ /\@yourdomain\.com/ > meta T_FD ( !__LOCAL_DOMAIN ) > describe T_FD To: foreign domain > score T_FD 5.0 > > - From:domain mismatches Received:domain > - Return-Path: missing header > These are not a hard symptom of spam, but we give them a 0.5 penalty anyway. > > - Received: from domain literal > Well-behaved servers, with state-of-the-art DNS and well implemented > SPF, DKIM and DMARC, they have domain name. They also cut out > the first hop, from the client to the server. > We give a full 1.0 penalty here. > > - Body: attachment without introductory text > I do not have a rule for this, yet. > > The default SA returns the following: > 0.0 TVD_SPACE_RATIO No description available. > 0.0 TVD_SPACE_RATIO_MINFP Space ratio > > Our SA returns a big fat spam flag. > > RG > > Sent with [ProtonMail](https://protonmail.com) Secure Email. > >> -------- Original Message -------- >> Subject: spample: Microsoft Office DDE exploit (in OpenXML attachment) >> Local Time: 31 October 2017 7:10 AM >> UTC Time: 31 October 2017 06:10 >> From: sa_c...@iowahoneypot.com >> To: users@spamassassin.apache.org >> >> Starting Monday late pm (Iowa time), I've been seeing my first DDE >> exploits, with significant volume. >> Here's a spample, with only the account part of the To header munged: >> http://puffin.net/software/spam/samples/0056_dde_auto.txt >> >> The MIME part Content Types are all of the same form, with only the >> nine (9) digit long invoice number being different (same as used in >> the Subject). The date part is changing correctly. >> So far, there's enough consistency there that it may be worth some >> quick rules. >> >> Here's a few of the Message-IDs: >> adr12896529648910347634474919b240d844eabec6a20f80...@canadianchemistry.ca >> adr7620524563497929668713350304233e03d64b1f8e8170...@rapidtest.ca >> adr68345885946016552575674219fe1b08f91debc7cfbb00...@allaharassociates.com >> adr876830136506609450916689649c89a27b537895370760...@imed-deltona.com >> adr426090832862978264036549945af7e4fe88b447543d90...@nationaleducationcouncil.com >> adr99440411731938631057549731c1c2a892fde297bf3f20...@wmacsolutions.com >> adr81956121236541247090766988290f5afbfdda13822ad0...@sofiamartindecoracion.es >> adr67473153783778389876391568ca7d883cc6de0610e100...@radiantsolutions.net >> adr26027147591253901902363379be430bba9cf219fd34a0...@aard.nl >> adr131945596038997342794846233353a6ec4959eaf2ab90...@zwart-holding.nl >> adr9656904421970779346632739481be4f2cff28e0788560...@edusophia.org >> adr73468520213265525945855867cfcfcd9887a98f9244f0...@osasgranitbutik.se >> In all cases, the domain matches the domain in the From header. >> >> So far, the From has always been in the form: >> Invoicing invoic...@example.com >> >> The only SA rules that they're all hitting are: >> TVD_SPACE_RATIO >> TVD_SPACE_RATIO_MINFP >> >> Internally, these were NOT as I was expecting. >> When the buzz about DDE first broke, I was expecting old style doc, >> rtf, and ics (calendar) files, and restricted my rules to those. >> Today's wave are all OpenXML, and the payload is in file >> "word/document.xml". >> >> If you take a close look at just the contents of "<w:instrText>" >> tag pairs, it appears they can easily obfuscate the payload. :( >> >> I need to do a LOT more reading, but for now, I've added >> seat-of-my-pants rules for exact word matches on: >> DDE >> instrText >> AUTO >> gfxdata >> >> So far, using an older (v3.4.1) plain vanilla SA setup, my >> killrate with Bayes is 48% (without Bayes, it would have been >> about 30.4%). >> >> My post SA filter has been killing them all, but that's due to my >> aggressive rules and a bit of luck. >> I've asked one of my people with less aggressive rules and more >> diverse ham to run some ham-only MassChecks using the above rules. >> I'll share the results. >> >> Has anyone seen the RTF or Calendar/.ics forms of this exploit? >> If so, please-please-please post a spample. >> - "Chip"