These look useful, and I'll likely put them on my server, but the one I
just received is an "Invoice Request". It doesn't have the traditional,
"we've detected unusual activity" kind of language.
I started scanning through the plain text (not wanting to trigger any of
the http links) and the requestor is from a "store" that just registered
their domain last month via cheapdomains and country-code for the
registration (which is "private") is Iceland.
Most of the relays are through outlook.com. Here's some of the
somewhat-relevant header info:
Authentication-Results: spf=pass (sender IP is 66.211.170.93)
smtp.mailfrom=paypal.com; dkim=pass (signature was verified)
header.d=paypal.com;dmarc=pass action=none header.from=paypal.com;
Received-SPF: Pass (protection.outlook.com: domain of paypal.com designates
66.211.170.93 as permitted sender) receiver=protection.outlook.com;
client-ip=66.211.170.93; helo=mx9.phx.paypal.com; pr=C
Received: from mx9.phx.paypal.com (66.211.170.93) by
SN1PEPF0002636A.mail.protection.outlook.com (10.167.241.135) with
Microsoft
SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.8182.16 via Frontend Transport; Wed, 20 Nov 2024 16:46:55 +0000
DKIM-Signature: v=1; a=rsa-sha256; d=paypal.com; s=pp-dkim1;
c=relaxed/relaxed;
q=dns/txt; i=@paypal.com; t=1732121214;
h=From:From:Subject:Date:To:MIME-Version:Content-Type;
bh=sjZqBd/pJ48V/boeNBoBSYq6r8uaGQRwW9DNRqL+x8w=;
b=Wazi7D82oQ/jdMmMasCKUIGWazMGAqIDHH0P0Sz4OcZ6DBxffiBKMKykCHyQkbrd
vUK8lPk2FLoxpf/D4dGW1zzjkC1VgOQNCegjRpamCjW4bcdmF4C42IYxBM78didc
dHnqWDJEJeguPJOwd3IyVIGODs2poFMLti5Ubiki9QYBrqCss742iRmJ7ImGhfmC
/h1aO1ZHWszXnopEtLEPy6wnLe2wprHCUabIF/gmNPzWDx+PtZLwcfFfPBHkB7xy
PtMhBfdumOsVDzhnKKfBZEilwm3Rgox04Tys+wBc4N7XGo5iDcCV/6y4U0qE/k/5
xo+c0pFwGXU6dPNAyPiAuQ==;
I also double-checked my PP account and there are no actual invoices in
there waiting for me.
Nuts.
On 11/21/2024 10:30 AM, Jared Hall wrote:
#
##############
### PAYPAL ###
##############
header __JR_PHISH_PPAL1A From:name =~
/(^(PayPal\s?|.*\@paypal\.com)|Via\sPayPal)/i
header __JR_PHISH_PPAL1B From:addr !~
/.*\@(.*\.)?(paypal|paypal\-communication)\.com$/i
header __JR_PHISH_PPAL1C Reply-To:addr !~
/.*\@(.*\.)?(paypal)\.com$/i
header __JR_PHISH_PPAL1G From:addr =~
/.*\@(.*\.)?(paypal|paypal\-communication)\.com$/i
meta JR_PHISH_PPAL1 (__JR_PHISH_PPAL1A && __JR_PHISH_PPAL1B)
describe JR_PHISH_PPAL1 Name Spoof/Phish Detected
score JR_PHISH_PPAL1 15.0
meta JR_PHISH_PPAL2 (__JR_HDR_SUBJ__PPAL1 && (__JR_PHISH_PPAL1B ||
(__JR_PHISH_REPLY && __JR_PHISH_PPAL1C)))
describe JR_PHISH_PPAL2 Name Spoof/Phish Detected
score JR_PHISH_PPAL2 15.0
body __JR_PHISH_PPAL3A
/(go\sto\sthe\sPayPal\swebsite|We\snoticed\sunusual\sactivity\sin\syour\sPayPal\saccount\.|you\'ve\sto\scheck\syour\sinformation|PayPal\.\sAll\srights\sreserved\.|You\sreceived\sthis\se\-mail\sas\sa\smember\sof\spaypal\.|PayPal\sSupport\sAll\srights\sare\sreserved|Copyright\s1999\-2019\sPayPal|This\sis\sthe\sLast\sreminder\sto\slog\sin\sto\sPayPal|PayPal\ssecure|We\'ve\salso\simposed\stemporary\slimits\son\scertain\sfeatures\son\syour\sPayPal\saccount|Copyright\s\xC2\xA9\s1999\-2021\sPayPal\.\sCopyright\sis\sprotected\sby\slaw\.)/m
tflags __JR_PHISH_PPAL3A nosubject
header __JR_PHISH_PPAL3B Subject =~
/(Your\saccount\sPayPal\swill\sbe\slimited|Unusual\sActivity\sOn\sYour\sPaypal\sAccount|K\xC3\xBCrzlich\shaben\swir\sIhr\sKonto\svor\xC3\xBCbergehend\seingeschr\xC3\xA4nkt)/i
# meta JR_PHISH_PPAL3 ((__JR_PHISH_PPAL3A || __JR_PHISH_PPAL3B)
&& (JR_PUBLIC_SHORTURL || JR_BODY_GREETINGS || JR_BODY_ADV_SCAM_META))
# describe JR_PHISH_PPAL3 Name Spoof/Phish Detected
# score JR_PHISH_PPAL3 15.0
# meta JR_PHISH_PPAL4 ((__JR_PHISH_PPAL1A ||
__JR_PHISH_PPAL1G) && (JR_PUBLIC_SHORTURL || JR_PHISH_DOC))
# describe JR_PHISH_PPAL4 Name Spoof/Phish Detected
# score JR_PHISH_PPAL4 15.0
header __JR_PHISH_PPAL5A ALL:raw !~
/Received:\sfrom\s(.*\.)?(paypal\.com|epsl1\.com)\s/m
meta JR_PHISH_PPAL5 ((__JR_PHISH_PPAL1A || __JR_PHISH_PPAL1G) &&
__JR_PHISH_PPAL5A)
describe JR_PHISH_PPAL5 Name Spoof/Phish Detected
score JR_PHISH_PPAL5 15.0
meta JR_PHISH_PPAL6 ((__JR_PHISH_PPAL3A || __JR_PHISH_PPAL3B)
&& __JR_PHISH_PPAL1B)
describe JR_PHISH_PPAL5 Name Spoof/Phish Detected
score JR_PHISH_PPAL5 2.5
Let me know how this works for you.
-- Jared Hall
ja...@jaredsec.com
Available for hire.
On 11/21/2024 7:57 AM, AJ Weber wrote:
I saw a "conversation" a few weeks ago regarding paypal phishing
emails that were not being caught.
I can't recall if anyone found a reasonable solution (or new rules).
I just received one and it seems very well crafted. Is anyone still
collecting samples and wants this one too?
Thanks for any recap anyone can provide.
-AJ