There's a new morph of the porn extortion campaign, with some
interesting under-the-hood changes.

The previous ones were always:
- two "quoted-printable" parts (plain text, html)
- "From" Outlook accounts
- sent via Outlook/Hotmail/MS IPs (no other IPs in route)
- passed both DKIM and SPF

The new version has:
- one base64 html part
- pure numeric "From" domain&account (same address in SMTP & header)
- sent via compromised computers (and typically 3 or 4 Received IPs)
- bogus domains so neither DKIM nor SPF possible
- 8 of 13 samples had a Reply-To, with the same address as the From,
  and the RealNames were different

Unchanged:
- html part has hundreds of comments containing just the To account
- pretty much the same message
  (new versions have some potentially useful HTML/comment chaff)
- _ALL_ have snuck thru plain vanilla SA :(
  (old Outlooks ones were consistently less than 1.0;
   new: 92% in 2s, 8% in very low 4s)

Currently, all IPs except one (the oldest) are on the CBL.

Full raw spample:
        
http://puffin.net/software/spam/samples/0058_extortion_numeric_domain.txt
I MUNGED the "To" and the Body.
Since I munged the account name to "target", I had to re encode the
Body.
** John Hardin & KAM:  if you'd like some unmunged spamples, I'd be
happy to send a zip. :)

Here's the SA test stats for 13 of this new morph:
  FORGED_MUA_MOZILLA          1
  HTML_MESSAGE               13
  HTML_MIME_NO_HTML_TAG      13
  LOCALPART_IN_SUBJECT       13
  MIME_BASE64_TEXT            9
  MIME_HTML_ONLY             13
  RCVD_IN_SORBS_DUL           1
  RDNS_DYNAMIC                3
  TVD_RCVD_SPACE_BRACKET      6
  UNPARSEABLE_RELAY           6

This new variant should be easy to exterminate. :)

1. The quick and easy combo of "HTML_MIME_NO_HTML_TAG" and
   "LOCALPART_IN_SUBJECT" is worth a meta.
   The latter test is _VERY_ rare in Ham.
2. Another meta with those two and "MIME_BASE64_TEXT" is even safer.
3. Pure numeric TLDs appear to be non existent (so far!), so I look
   forward to you regex wizards doing your thing. :)
4. There's lots of low risk phrases worth scoring (KAM rules?).
5. Riskier & more complex:  The pattern of the account name occurring
   hundreds of times in HTML comments is distinctive, and "feels"
   safe, however Thick Hammers are unpredictable.
   I will be releasing a regression test for my volunteers.
   Once I get sufficient Ham stats, I'll report back.


Three other unusual things (all demonstrated in this spample):

1. 9 of the 13 had a two part pure numeric claimed host (see below).
I don't recall seeing that before.
** Is that a botnet fingerprint?

2. 9 of the 13 lacked a trailing "=".
I don't recall seeing that before.
It's probably worth a quick test, if easy to implement.
There was no correlation with the numeric host pattern.

3. 4 of the 13 failed to hit "MIME_BASE64_TEXT".
I'm curious what the issue is.
The trailing "=" was not a factor.
The main thing that stood out is that the hits all had this CT:
Content-Type: text/html;
        charset="us-ascii"
The misses all had:
Content-Type: text/html;
        charset="iso-8859-1"


Here are the IPs, and the claimed hostnames in square brackets:
        1.52.117.145    [738.521]
        5.76.183.251    [926.664]
        14.231.121.148  [253.975]
        41.212.106.159  [41.212.106.159.wananchi.com]
        42.113.254.123  [303.494]
        49.205.51.26    [broadband.actcorp.in]
        94.233.89.142   [dsl-94-233-89-142.avtlg.ru]
        103.86.161.66   [439.461]
        109.60.246.66   [842.384]
        180.252.178.204 [742.584]
        196.190.63.7    [982.491]
        197.248.154.10  [197-248-154-10.safaricombusiness.co.ke]
        202.138.244.76  [344.393]

Here are the actual (unmunged) From headers:
        "Sofia Kirby" <066@842.384>
        "Eugenia Koch" <340@145.390>
        "Trisha Savage" <907@344.393>
        "Debra Arnold" <367@439.461>
        "Christine Waller" <294@982.491>
        "Lawrence Bender" <516@303.494>
        "Rey Wooten" <381@738.521>
        "Elvira Nguyen" <977@557.566>
        "Mai Mullins" <556@742.584>
        "Darrick Hendricks" <540@926.664>
        "Pablo Hess" <692@442.947>
        "Elba Olsen" <255@434.964>
        "Millie Weber" <041@253.975>


We're killing 100% of these (post plain-vanilla SA), mainly due to
IP Nation tests, lots of custom body phrase tests, and some body
"stupid tricks" tests.

I've just added the above suggested SA metas, and a 
low level (non-regex) pure numeric TLD test.

I expect more morphs.
        - "Chip"

P.S.  It occurred to me that the complete lack of Sender Verification
in these could benefit spammers. There's zero DKIM processing
overhead, so these should be processed a wee bit faster by
non-graylisting receivers. That could make the difference in whether
it hits a post-gateway blocklist.
** Does anyone have performance stats on how long DKIM processing
takes?
That might explain the drop in DKIM usage by snowshoers.


Reply via email to