On 05/15/2018 08:26 PM, David B Funk wrote:
On Tue, 15 May 2018, Alex wrote:

Hi,

We received another of those phishes as a result of a compromised O365 account.

https://pastebin.com/raw/Fv5NKRAP

Anyone able to take a look and provide ideas on how to block them? It
passes with DKIM_VALID_AU, RCVD_IN_SENDERSCORE_90_100 and SPF_PASS.

It's missing headers, and I've written a rule to account for that, but
it would be great to have some other input.

Interestingly, it was passed through a mimecast system first.

The amount of Outlook/O365/Exchange headers in this email is enormous!

Thanks,
Alex

For openers either totally lose "RCVD_IN_HOSTKARMA_W" & "RCVD_IN_DNSWL_LOW" rules, or set their score to something minimal (EG -0.1 instead of that honking -2.5) or create a rule that detects the message being from O365 and meta it with RCVD_IN_HOSTKARMA_W to then add an offsetting score to nullify the damage from RCVD_IN_HOSTKARMA_W WRT O365.


Due to the junk coming out of O365 lately I have setup OFFSET rules to add back any whitelist points for messages received from O365. I grep'd my rules for any rules that subtracted points and made meta rules to add back the same amount. Due to the size of O365 you really can't allow any of their IPs to to subtract points.


(Can we get the maintainers of RCVD_IN_HOSTKARMA_W to remove that contagion pit called O365 from their list of "good guy" sites?).


Yes, please! Good RBLs will not list large mail service providers like Google and O365 in their whitelists since there is a mixture of ham and spam.

I've done a bit of all of the above so an incoming O365 message ends up with no "brownie points" at all, so it's only scored on the merits of its contents.

Then look for custom anti-phish rulesets. Your example hit a rule "RULEGEN_PHISH2" which was in a file 90_rulegen_phish.cf on my server.
(I'm sorry I don't remember where I got that from).

Train bayes, look for custom URIBL lists that might hit that powned website.



I have seen quite a bit of junk coming out of mimecast.com's servers in recent months. I am about to add them to my NOTRUST list which puts them in the FREEMAIL category of commonly abused mail service providers. Then my meta rules based on ENA_FREEMAIL will bump up points for email coming through any NOTRUST servers.

--
David Jones

Reply via email to