On Fri, 7 Feb 2025, Kris Deugau wrote:

Dave Funk wrote:

 The examples of this scam that I've seen use that same PayPal comment
 tactic but then route it to an Office-365 mailbox which has a redirect to
 the victim's address.
 So the resultant message has both PayPal & O-365 valid DKIM signatures;
 not to mention the multiple KB of O-365 header cruft which makes it hard
 to trace the original source.

Just to throw some extra, um, "joy" into this conversation...

I've just seen a sample, received directly by our spam filter tuning role account, that first travelled through a Google account (probably GMail, if I've unwound the headers right), which forwarded to the compromised/scammer-owned M365 tenant, which forwarded to us (and who knows who all else.

I'll report it to PayPal, Google, and MS, but watch as nothing happens...

GNGGNGNGNGNNNNNNNNNGGH.....

-kgd

These sort of shenanigans are fairly easy to spot, but... if the masscheck corpora don't have sufficient examples of them, or potentially worse do have examples of them that are misclassified as ham, then those rules will never be published with scores high enough to make a difference unless the scores are set manually, which increases their FP risk.

I'd ask all who are doing masschecks to review their corpora of Paypal messages to see whether these messages, and Paypal messages with obfuscated phone numbers, are misclassified as ham.


--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org                         pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  Win95: Where do you want to go today?
  Vista: Where will Microsoft allow you to go today?
-----------------------------------------------------------------------
 4 days until Abraham Lincoln's and Charles Darwin's 216th Birthdays

Reply via email to