Re: [mailop] Increase in virus activity this week @ MXroute (perhaps others?)

2022-04-23 Thread Byung-Hee HWANG via mailop
(... sorry for top-posting ...)

Dear Jarland,

In the whole story, i feel that you are NICE guy!
NICE(= faithful + technical + reasonable)

Thanks ^^^

Sincerely, Linux fan Byung-Hee

Jarland Donnell via mailop  writes:

> It's a good topic, and one I'm fairly passionate about. Obviously at
> small scale it's super easy to tell when anything is off from normal, 
> but as you grow it's more difficult to rely on eyes and ears. But that
> was kind of my dream: I want to be as present as though I'm one admin, 
> logged into one machine, merely watching it function and asking "Why?"
> when something unusual happens (CPU spike, queue higher than it's been 
> this year to date, a flood of connections from X IP, etc). I want to
> scale that, I want to scale me.
>
> So that's really what I do. I just scale me. If you were sitting in an
> SSH session tailing a log and just watching for anything that sets off
> a mental alarm, what would the things be that would trigger that
> mental alarm? I take the answer to that and have automated checks
> which then do one of two things:
>
> 1. Alert me for human review.
> 2. Perform the reaction that I would have performed if I were sitting
> there watching at the time.
>
> It can be kind of a mess but right now I'm at over 14,000 clients
> (exponentially more if counting customers of my customers) and growing 
> rapidly. Thus far I've been able to grow myself by way of coding
> checks and balances that operate like I think. That's pretty vague so
> I'll give an example.
>
> In rspamd I have this map configured:
>
> COMPD_RCPT {
>   type = "rcpt";
>   header = "subject";
>   filter = "email";
>   map = "${LOCAL_CONFDIR}/local.d/compd_rcpt.map";
>   symbol = "COMPD_RCPT";
>   prefilter = true;
>   action = "reject";
>   regexp = true;
> }
>
> Then I have this running on cron:
>
> https://paste.mxrouteapps.com/?6603394e7d823164#4r5qkNXATJTko55DWmwxjrrbTLCvJ9t5ry61cf5zfHE5
>
> Every morning I get up and I check /root/ALERT_RCPT.log and then open
> a ticket with the customer. This is where the next automation will be
> as the scale continues to grow, automatically targeting the user and 
> opening a ticket with them.
>
> Now what that map does, it lists the recipient emails used by specific
> spammers who send "test" emails to verify SMTP credentials before they 
> start a campaign. Most of them use the same recipient email every
> time, so all I have to do is look for it and know "That user's
> password is compromised."
>
> For even more fun, I have a basic HTML page hidden behind
> authentication which lists two columns. On one side, the top 15
> senders of this hour. On the other side, the top 15 senders of the
> last hour. Forcing yourself to be familiar with the top users of your
> platform by observing how much of your infrastructure they are
> utilizing creates a mental place where you can immediately recognize
> when something is off. Toss it on a monitor, have the entire abuse
> team just stare at it every time they glance away from their
> work. While you might think that would outgrow it's usefulness with
> scale, I've worked at large enough scale that I simply don't think it
> to be so. The top resource users on your platform will change over
> time, but the vast majority will always be too low utilization to be
> noteworthy.
>
> Even still, if it were to be outgrown, a good database system could
> keep track of senders enough to say "This person who only sent 1 email
> a day for the last year just sent 600, might be worth checking the
> logs to see if they're alright."
>
> And that's really where it all comes back to: What do I want to know?
> What would concern me to see? What would I do if I saw it? Then, quite 
> simply, turn that logic into code and make it work for you.
>
> Hope that wasn't too vague to be useful!
>
> Jarland

-- 
^고맙습니다 _布德天下_ 감사합니다_^))//
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Increase in virus activity this week @ MXroute (perhaps others?)

2022-04-23 Thread Jarland Donnell via mailop
It's a good topic, and one I'm fairly passionate about. Obviously at 
small scale it's super easy to tell when anything is off from normal, 
but as you grow it's more difficult to rely on eyes and ears. But that 
was kind of my dream: I want to be as present as though I'm one admin, 
logged into one machine, merely watching it function and asking "Why?" 
when something unusual happens (CPU spike, queue higher than it's been 
this year to date, a flood of connections from X IP, etc). I want to 
scale that, I want to scale me.


So that's really what I do. I just scale me. If you were sitting in an 
SSH session tailing a log and just watching for anything that sets off a 
mental alarm, what would the things be that would trigger that mental 
alarm? I take the answer to that and have automated checks which then do 
one of two things:


1. Alert me for human review.
2. Perform the reaction that I would have performed if I were sitting 
there watching at the time.


It can be kind of a mess but right now I'm at over 14,000 clients 
(exponentially more if counting customers of my customers) and growing 
rapidly. Thus far I've been able to grow myself by way of coding checks 
and balances that operate like I think. That's pretty vague so I'll give 
an example.


In rspamd I have this map configured:

COMPD_RCPT {
  type = "rcpt";
  header = "subject";
  filter = "email";
  map = "${LOCAL_CONFDIR}/local.d/compd_rcpt.map";
  symbol = "COMPD_RCPT";
  prefilter = true;
  action = "reject";
  regexp = true;
}

Then I have this running on cron:

https://paste.mxrouteapps.com/?6603394e7d823164#4r5qkNXATJTko55DWmwxjrrbTLCvJ9t5ry61cf5zfHE5

Every morning I get up and I check /root/ALERT_RCPT.log and then open a 
ticket with the customer. This is where the next automation will be as 
the scale continues to grow, automatically targeting the user and 
opening a ticket with them.


Now what that map does, it lists the recipient emails used by specific 
spammers who send "test" emails to verify SMTP credentials before they 
start a campaign. Most of them use the same recipient email every time, 
so all I have to do is look for it and know "That user's password is 
compromised."


For even more fun, I have a basic HTML page hidden behind authentication 
which lists two columns. On one side, the top 15 senders of this hour. 
On the other side, the top 15 senders of the last hour. Forcing yourself 
to be familiar with the top users of your platform by observing how much 
of your infrastructure they are utilizing creates a mental place where 
you can immediately recognize when something is off. Toss it on a 
monitor, have the entire abuse team just stare at it every time they 
glance away from their work. While you might think that would outgrow 
it's usefulness with scale, I've worked at large enough scale that I 
simply don't think it to be so. The top resource users on your platform 
will change over time, but the vast majority will always be too low 
utilization to be noteworthy.


Even still, if it were to be outgrown, a good database system could keep 
track of senders enough to say "This person who only sent 1 email a day 
for the last year just sent 600, might be worth checking the logs to see 
if they're alright."


And that's really where it all comes back to: What do I want to know? 
What would concern me to see? What would I do if I saw it? Then, quite 
simply, turn that logic into code and make it work for you.


Hope that wasn't too vague to be useful!

Jarland

On 2022-04-22 15:28, Cyril - ImprovMX via mailop wrote:

Hi Jarland,

that was very interesting, thank you for sharing these details.

I'm curious to know how you caught this in the first place. It would
be interesting to know some technics on how to catch bad behaviors
before they get out of hand and many of us here might be interested in
the how-tos and might also learn a lot from this (me first).

thank you in advance :)

Best,
Cyril

Le ven. 22 avr. 2022 à 00:57, Jarland Donnell via mailop
 a écrit :


Hey friends,

This week at MXroute we saw an increase in compromised email
accounts.
Apologies if you saw virus spam coming from our network. Typically,
these events are caught instantly. In cases that use new patterns
and
techniques, under 1 hour. This time, it went on intermittently for
about
half a day on 4/20 (I wish it was for THAT reason), and it happened
a
few times in the days prior. What we found was that every one of
these
outbound emails contained this virus:


https://www.virustotal.com/gui/file/707d507f138a450fb4c7b5c906f280259f23f5aac808b8dfcd23b66d0d679441/detection


It's not difficult to assume that the users received the same virus
beforehand, whether by email or otherwise. The virus appears to use
each
infected computer as part of a botnet, and each computer is involved
in
authenticating over SMTP and sending out copies of the virus. The
only
thing I never saw was our infected users connecting to our servers
to
send the spam, it was 

Re: [mailop] Interesting passage from the new EU Digital Services Act

2022-04-23 Thread Jarland Donnell via mailop
I'm prone to reading things like that as meaning "if you happen across 
something" rather than "please go digging and if there's something to 
find and you don't find it, you're dead."


On 2022-04-23 17:55, Jean-François Bachelet via mailop wrote:

Hello ^^)


Haven't read the full EU stuff yet, but question :


How can we be possibly become aware of such possible threats without
SPYING -read it all- the email passing by our mail servers ???

only a jackass wana be terrst will put dangerous/alarm trigger
stuff in the Subject of his emails.

so do the EU wants us to play as NSA for free ? and pursue us if we 
don't...


...


Le 24/04/2022 à 00:17, Jarland Donnell via mailop a écrit :
Admittedly I do like the phrase "becomes aware of" as it should in 
theory place the burden on a third party to prove awareness. Though I 
can't imagine a lot of people become aware of a serious threat against 
someone's life and then turn the other way, at least not anyone who 
wouldn't now simply claim "I wasn't aware of it."


On 2022-04-23 15:36, Anne Mitchell via mailop wrote:
"Where an online platform becomes aware of any information giving 
rise

to a suspicion that a serious criminal offence involving a threat to
the life or safety of persons has taken place, is taking place or is
likely to take place, it shall promptly inform the law enforcement or
judicial authorities of the Member State or Member States concerned 
of

its suspicion and provide all relevant information available."

Hrrrm... I wonder whether the online platforms of which we are ware
who know full well that phishing is happening on their platform have
promptly informed law enforcement.

Note that the DSA explicitly states that it applies to entities
outside of the EU as well as within the EU.

(Our write-up of our first impressions of how we see the DSA being
applied to email is here, and includes the full text of the DSA:
https://www.isipp.com/what-the-eus-new-digital-services-act-means-for-email-marketing/) 
Anne


---
Anne P. Mitchell,  Esq.
CEO Get to the Inbox by SuretyMail
Author: Section 6 of the CAN-SPAM Act of 2003 (the Federal email 
marketing law)

Author: The Email Deliverability Handbook
Board of Directors, Denver Internet Exchange
Dean Emeritus, Cyberlaw & Cybersecurity, Lincoln Law School
Prof. Emeritus, Lincoln Law School
Chair Emeritus, Asilomar Microcomputer Workshop
Counsel Emeritus, MAPS: Mail Abuse Prevention System (now the
anti-spam division of TrendMicro)

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Interesting passage from the new EU Digital Services Act

2022-04-23 Thread Anne Mitchell via mailop

> How can we be possibly become aware of such possible threats without SPYING 
> -read it all- the email passing by our mail servers ??? only a jackass wana 
> be terrst will put dangerous/alarm trigger stuff in the Subject of his 
> emails. so do the EU wants us to play as NSA for free ? and pursue us if we 
> don't...

I'm not sure about the EU (although I'm guessing it's the same) there is often 
a "knew or should have known" standard (in fact that's the standard in the 
section of CAN-SPAM that I wrote).  So if that is the same in the EU, then 
people reporting to the provider about the threat would trigger it...remember 
I'm saying *IF* because I don't know.  That said, there are full swaths of text 
in the DSA that talk about complaints lodged with providers.

For anyone wanting the full text, you can find it down at the bottom of the 
article 
(https://www.isipp.com/what-the-eus-new-digital-services-act-means-for-email-marketing/)

Anne

--
Anne P. Mitchell, Attorney at Law
CEO ISIPP SuretyMail
Author: Section 6 of the CAN-SPAM Act of 2003 (the Federal email marketing law)
Author: The Email Deliverability Handbook
Board of Directors, Denver Internet Exchange
Dean Emeritus, Cyberlaw & Cybersecurity, Lincoln Law School
Prof. Emeritus, Lincoln Law School
Chair Emeritus, Asilomar Microcomputer Workshop
Counsel Emeritus: Mail Abuse Prevention System (MAPS) (now the anti-spam arm of 
TrendMicro)


___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Interesting passage from the new EU Digital Services Act

2022-04-23 Thread Jean-François Bachelet via mailop

Hello ^^)


Haven't read the full EU stuff yet, but question :


How can we be possibly become aware of such possible threats without 
SPYING -read it all- the email passing by our mail servers ???


only a jackass wana be terrst will put dangerous/alarm trigger stuff 
in the Subject of his emails.


so do the EU wants us to play as NSA for free ? and pursue us if we don't...

...


Le 24/04/2022 à 00:17, Jarland Donnell via mailop a écrit :
Admittedly I do like the phrase "becomes aware of" as it should in 
theory place the burden on a third party to prove awareness. Though I 
can't imagine a lot of people become aware of a serious threat against 
someone's life and then turn the other way, at least not anyone who 
wouldn't now simply claim "I wasn't aware of it."


On 2022-04-23 15:36, Anne Mitchell via mailop wrote:

"Where an online platform becomes aware of any information giving rise
to a suspicion that a serious criminal offence involving a threat to
the life or safety of persons has taken place, is taking place or is
likely to take place, it shall promptly inform the law enforcement or
judicial authorities of the Member State or Member States concerned of
its suspicion and provide all relevant information available."

Hrrrm... I wonder whether the online platforms of which we are ware
who know full well that phishing is happening on their platform have
promptly informed law enforcement.

Note that the DSA explicitly states that it applies to entities
outside of the EU as well as within the EU.

(Our write-up of our first impressions of how we see the DSA being
applied to email is here, and includes the full text of the DSA:
https://www.isipp.com/what-the-eus-new-digital-services-act-means-for-email-marketing/) 



Anne

---
Anne P. Mitchell,  Esq.
CEO Get to the Inbox by SuretyMail
Author: Section 6 of the CAN-SPAM Act of 2003 (the Federal email 
marketing law)

Author: The Email Deliverability Handbook
Board of Directors, Denver Internet Exchange
Dean Emeritus, Cyberlaw & Cybersecurity, Lincoln Law School
Prof. Emeritus, Lincoln Law School
Chair Emeritus, Asilomar Microcomputer Workshop
Counsel Emeritus, MAPS: Mail Abuse Prevention System (now the
anti-spam division of TrendMicro)

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [E] $GOOG

2022-04-23 Thread Jaroslaw Rafa via mailop
Dnia 23.04.2022 o godz. 14:48:05 Dan Mahoney via mailop pisze:
> 
> I would LOVE there to be legal structure to say “Gee, Equifax, you failed
> to demonstrate the basic opsec of paying some junior admin to type `yum
> upgrade apache-struts`, so you don’t get to keep my PII anymore.” I would
> love if there was an option to simply put a flag on my SSN that says
> “gather/sell no data” to any of the dozens of agencies that harvest this
> (radaris et al) and package it up neatly.

Isn't European GDPR something that is supposed to achieve exactly this?

Yes, it doesn't work perfectly, and there are multiple companies that try to
go around it in multiple ways, but it's a step in good direction IMHO.

At least at the moment when GDPR came into effect I observed a BIG drop in
amount of spam coming to my server. And still, after several years, it
didn't return to pre-GDPR quantities yet...

Of course YMMV, especially outside Europe...
-- 
Regards,
   Jaroslaw Rafa
   r...@rafa.eu.org
--
"In a million years, when kids go to school, they're gonna know: once there
was a Hushpuppy, and she lived with her daddy in the Bathtub."
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Interesting passage from the new EU Digital Services Act

2022-04-23 Thread Jarland Donnell via mailop
Admittedly I do like the phrase "becomes aware of" as it should in 
theory place the burden on a third party to prove awareness. Though I 
can't imagine a lot of people become aware of a serious threat against 
someone's life and then turn the other way, at least not anyone who 
wouldn't now simply claim "I wasn't aware of it."


On 2022-04-23 15:36, Anne Mitchell via mailop wrote:

"Where an online platform becomes aware of any information giving rise
to a suspicion that a serious criminal offence involving a threat to
the life or safety of persons has taken place, is taking place or is
likely to take place, it shall promptly inform the law enforcement or
judicial authorities of the Member State or Member States concerned of
its suspicion and provide all relevant information available."

Hrrrm... I wonder whether the online platforms of which we are ware
who know full well that phishing is happening on their platform have
promptly informed law enforcement.

Note that the DSA explicitly states that it applies to entities
outside of the EU as well as within the EU.

(Our write-up of our first impressions of how we see the DSA being
applied to email is here, and includes the full text of the DSA:
https://www.isipp.com/what-the-eus-new-digital-services-act-means-for-email-marketing/)

Anne

---
Anne P. Mitchell,  Esq.
CEO Get to the Inbox by SuretyMail
Author: Section 6 of the CAN-SPAM Act of 2003 (the Federal email 
marketing law)

Author: The Email Deliverability Handbook
Board of Directors, Denver Internet Exchange
Dean Emeritus, Cyberlaw & Cybersecurity, Lincoln Law School
Prof. Emeritus, Lincoln Law School
Chair Emeritus, Asilomar Microcomputer Workshop
Counsel Emeritus, MAPS: Mail Abuse Prevention System (now the
anti-spam division of TrendMicro)

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Interesting passage from the new EU Digital Services Act

2022-04-23 Thread Sebastian Nielsen via mailop
It doesn't apply to phishing. Its very clear its about emergencies, ergo 
threats about violence, bombs and such.
Phishing is definitely not a "threat to the life or safety of persons" as it 
only poses a threat to property, ergo money.

-Ursprungligt meddelande-
Från: Anne Mitchell via mailop  
Skickat: den 23 april 2022 22:38
Till: Michael Orlitzky via mailop 
Ämne: [mailop] Interesting passage from the new EU Digital Services Act

"Where an online platform becomes aware of any information giving rise to a 
suspicion that a serious criminal offence involving a threat to the life or 
safety of persons has taken place, is taking place or is likely to take place, 
it shall promptly inform the law enforcement or judicial authorities of the 
Member State or Member States concerned of its suspicion and provide all 
relevant information available."

Hrrrm... I wonder whether the online platforms of which we are ware who know 
full well that phishing is happening on their platform have promptly informed 
law enforcement.

Note that the DSA explicitly states that it applies to entities outside of the 
EU as well as within the EU.

(Our write-up of our first impressions of how we see the DSA being applied to 
email is here, and includes the full text of the DSA: 
https://www.isipp.com/what-the-eus-new-digital-services-act-means-for-email-marketing/)

Anne

---
Anne P. Mitchell,  Esq.
CEO Get to the Inbox by SuretyMail
Author: Section 6 of the CAN-SPAM Act of 2003 (the Federal email marketing law)
Author: The Email Deliverability Handbook Board of Directors, Denver Internet 
Exchange Dean Emeritus, Cyberlaw & Cybersecurity, Lincoln Law School Prof. 
Emeritus, Lincoln Law School Chair Emeritus, Asilomar Microcomputer Workshop 
Counsel Emeritus, MAPS: Mail Abuse Prevention System (now the anti-spam 
division of TrendMicro)

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [E] $GOOG

2022-04-23 Thread Dan Mahoney via mailop
> 
>> I am not
>> familiar with the lawsuits, but the general solution to all reputation
>> services, whether IP-reputation, consumer credit, or any other business
>> that collects information about other subjects (the building block of
>> surveillance capitalism!) is consent:  if the subject does not consent,
>> do not collect/report.  No reporting, no cause for legal action.
>> Provide reputation certificates for subjects that opt into the service
>> and let recipients decide how to deal with the absence of such
>> reputation ceritificate(s).
> 
> your unfamiliarity extends demonstrably beyond the lawsuits. if you choose to 
> do some research and ask some informed questions, i'd love to hear them and 
> try to engage further.

This will be off-topic for mailop, but…I remember Vixie giving a talk at 
MeetBSD, at the same moment that I found out that the latest-at-the-time 
equifax breach had exposed my information a few years back.

I would LOVE there to be legal structure to say “Gee, Equifax, you failed to 
demonstrate the basic opsec of paying some junior admin to type `yum upgrade 
apache-struts`, so you don’t get to keep my PII anymore.”  I would love if 
there was an option to simply put a flag on my SSN that says “gather/sell no 
data” to any of the dozens of agencies that harvest this (radaris et al) and 
package it up neatly.  

This is not the place to get into what dystopias being able to fully “opt out”  
would lead to, except that in either case (IP or PII), a lack of fingerprint 
would surely also be regarded as suspicious and approached with gated, minimal 
trust, if any at all.  

More on topic, however:

Consent or no, for all the intelligence sources you know about (on mxtoolbox’s 
multi-rbl checker, etc), there are dozens, possibly hundreds more, private 
ones.  Some in a manually maintained DB, some in a bayesian statistical DB 
based on how likely your domain is to spam based on email volume and SPF/DKIM 
records, and some that model way more data that you can imagine, that only 
exist in the mind of an AI that’s completely opaque, even to the people that 
coded it.

I strongly believe one such black box exists inside G, and that it's not the 
only place.

The best thing you can do is learn the correct inputs to the black box, at the 
time.  Build your own statistics of what your netblock is doing, and actually 
read and report on them before someone else does.  Email is no longer “set it 
and forget it” and hasn’t been for decades or more.

-Dan
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Interesting passage from the new EU Digital Services Act

2022-04-23 Thread Anne Mitchell via mailop
"Where an online platform becomes aware of any information giving rise to a 
suspicion that a serious criminal offence involving a threat to the life or 
safety of persons has taken place, is taking place or is likely to take place, 
it shall promptly inform the law enforcement or judicial authorities of the 
Member State or Member States concerned of its suspicion and provide all 
relevant information available."

Hrrrm... I wonder whether the online platforms of which we are ware who know 
full well that phishing is happening on their platform have promptly informed 
law enforcement.

Note that the DSA explicitly states that it applies to entities outside of the 
EU as well as within the EU.

(Our write-up of our first impressions of how we see the DSA being applied to 
email is here, and includes the full text of the DSA: 
https://www.isipp.com/what-the-eus-new-digital-services-act-means-for-email-marketing/)

Anne

---
Anne P. Mitchell,  Esq.
CEO Get to the Inbox by SuretyMail
Author: Section 6 of the CAN-SPAM Act of 2003 (the Federal email marketing law)
Author: The Email Deliverability Handbook
Board of Directors, Denver Internet Exchange
Dean Emeritus, Cyberlaw & Cybersecurity, Lincoln Law School
Prof. Emeritus, Lincoln Law School
Chair Emeritus, Asilomar Microcomputer Workshop
Counsel Emeritus, MAPS: Mail Abuse Prevention System (now the anti-spam 
division of TrendMicro)

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop