On 11/7/24 3:02 AM, Alex wrote:
Hi,

I received a paypal scam invoice using paypal servers that passed DKIM and sent 
through paypal servers but has the return path of some other server after it 
went through paypal.

[...]
From: "serv...@paypal.com <mailto:serv...@paypal.com>" <serv...@paypal.com 
<mailto:serv...@paypal.com>>
To:billingdepartmen...@cvoedukempen.onmicrosoft.com 
<mailto:billingdepartmen...@cvoedukempen.onmicrosoft.com>
Subject: Reminder: You've still got a money request

It's intended for the victim to call the toll-free number to fake paypal 
immediately or they will be charged.
Note from Berkshire Hathaway:
Don't recognize the seller? Please contact PayPal Support Team immediately at 
.... If you have any issues, you can also contact +... (Toll Free). If you do 
not reach out, we will proceed with the transaction.


I tried the trick of first adding *@paypal.com <http://paypal.com> to the welcomelist 
then blocking all of paypal.com <http://paypal.com>, but it didn't work. Both were 
blocked.

welcomelist_auth *@paypal.com <http://paypal.com>
blocklist_from *@paypal.com <http://paypal.com>

None of the KAM paypal rules are effective here, either.

can I have a copy of the email ?
I am working on improving some KAM Paypal rules.
 Thanks
  Giovanni


I can add the phone number and perhaps some body rules and the envelope sender, 
but is there a more durable way to block these?


Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to