Addenda:

> From: Invoicing <invoic...@canadianchemistry.ca>

>unbound-host -rvD canadianchemistry.ca
canadianchemistry.ca has address 168.144.155.97 (insecure)
canadianchemistry.ca has no IPv6 address (insecure)
canadianchemistry.ca mail is handled by 0 
canadianchemistry-ca.mail.protection.outlook.com. (insecure)

> Received: from .... not from Microsoft

SPF should fail hard here.

RG

Sent with [ProtonMail](https://protonmail.com) Secure Email.

> -------- Original Message --------
> Subject: Re: spample: Microsoft Office DDE exploit (in OpenXML attachment)
> Local Time: 31 October 2017 11:49 AM
> UTC Time: 31 October 2017 10:49
> From: r...@protonmail.com
> To: Chip M. <sa_c...@iowahoneypot.com>
> users@spamassassin.apache.org <users@spamassassin.apache.org>
>
> This is my reading of it.
>
> - You may have received an e-mail addressed to someone-else.
> I do not know your setup, but this is what it looks like from my seat.
> (Sent "To" [@puffin.net](mailto:bait_sa_e3npnogbtq1d4...@puffin.net), but 
> "Received: from" futurequest.net.)
> We have a custom rule for this junk. In general, if you domain is
> example.com and your server receives e-mail to whatever.com,
> then you can reject it by local policy.
>
> header __LOCAL_DOMAIN To:raw =~ /\@yourdomain\.com/
> meta     T_FD ( !__LOCAL_DOMAIN )
> describe T_FD To: foreign domain
> score    T_FD 5.0
>
> - From:domain mismatches Received:domain
> - Return-Path: missing header
> These are not a hard symptom of spam, but we give them a 0.5 penalty anyway.
>
> - Received: from domain literal
> Well-behaved servers, with state-of-the-art DNS and well implemented
> SPF, DKIM and DMARC, they have domain name. They also cut out
> the first hop, from the client to the server.
> We give a full 1.0 penalty here.
>
> -  Body: attachment without introductory text
> I do not have a rule for this, yet.
>
> The default SA returns the following:
> 0.0 TVD_SPACE_RATIO        No description available.
> 0.0 TVD_SPACE_RATIO_MINFP  Space ratio
>
> Our SA returns a big fat spam flag.
>
> RG
>
> Sent with [ProtonMail](https://protonmail.com) Secure Email.
>
>> -------- Original Message --------
>> Subject: spample: Microsoft Office DDE exploit (in OpenXML attachment)
>> Local Time: 31 October 2017 7:10 AM
>> UTC Time: 31 October 2017 06:10
>> From: sa_c...@iowahoneypot.com
>> To: users@spamassassin.apache.org
>>
>> Starting Monday late pm (Iowa time), I've been seeing my first DDE
>> exploits, with significant volume.
>> Here's a spample, with only the account part of the To header munged:
>> http://puffin.net/software/spam/samples/0056_dde_auto.txt
>>
>> The MIME part Content Types are all of the same form, with only the
>> nine (9) digit long invoice number being different (same as used in
>> the Subject). The date part is changing correctly.
>> So far, there's enough consistency there that it may be worth some
>> quick rules.
>>
>> Here's a few of the Message-IDs:
>> adr12896529648910347634474919b240d844eabec6a20f80...@canadianchemistry.ca
>> adr7620524563497929668713350304233e03d64b1f8e8170...@rapidtest.ca
>> adr68345885946016552575674219fe1b08f91debc7cfbb00...@allaharassociates.com
>> adr876830136506609450916689649c89a27b537895370760...@imed-deltona.com
>> adr426090832862978264036549945af7e4fe88b447543d90...@nationaleducationcouncil.com
>> adr99440411731938631057549731c1c2a892fde297bf3f20...@wmacsolutions.com
>> adr81956121236541247090766988290f5afbfdda13822ad0...@sofiamartindecoracion.es
>> adr67473153783778389876391568ca7d883cc6de0610e100...@radiantsolutions.net
>> adr26027147591253901902363379be430bba9cf219fd34a0...@aard.nl
>> adr131945596038997342794846233353a6ec4959eaf2ab90...@zwart-holding.nl
>> adr9656904421970779346632739481be4f2cff28e0788560...@edusophia.org
>> adr73468520213265525945855867cfcfcd9887a98f9244f0...@osasgranitbutik.se
>> In all cases, the domain matches the domain in the From header.
>>
>> So far, the From has always been in the form:
>> Invoicing invoic...@example.com
>>
>> The only SA rules that they're all hitting are:
>> TVD_SPACE_RATIO
>> TVD_SPACE_RATIO_MINFP
>>
>> Internally, these were NOT as I was expecting.
>> When the buzz about DDE first broke, I was expecting old style doc,
>> rtf, and ics (calendar) files, and restricted my rules to those.
>> Today's wave are all OpenXML, and the payload is in file
>> "word/document.xml".
>>
>> If you take a close look at just the contents of "<w:instrText>"
>> tag pairs, it appears they can easily obfuscate the payload. :(
>>
>> I need to do a LOT more reading, but for now, I've added
>> seat-of-my-pants rules for exact word matches on:
>> DDE
>> instrText
>> AUTO
>> gfxdata
>>
>> So far, using an older (v3.4.1) plain vanilla SA setup, my
>> killrate with Bayes is 48% (without Bayes, it would have been
>> about 30.4%).
>>
>> My post SA filter has been killing them all, but that's due to my
>> aggressive rules and a bit of luck.
>> I've asked one of my people with less aggressive rules and more
>> diverse ham to run some ham-only MassChecks using the above rules.
>> I'll share the results.
>>
>> Has anyone seen the RTF or Calendar/.ics forms of this exploit?
>> If so, please-please-please post a spample.
>> - "Chip"

Reply via email to