Re: Bogus mails from hijacked accounts

2010-03-13 Thread Benny Pedersen

On lør 13 mar 2010 02:14:02 CET, Michelle Konzack wrote


The roblem is, accourding to the RFCs, ISP must have an abuse address,
but do you have ever tried this with a corporated domain?
Even postmaster is rejected on most domains.


report them on rfc-ignorant.org


Ome tim ago we had a problem on a bnch of  Debian  mailinglists  with  a
persupermarket and after the ISP was not responsive, I  have  spidered
theire WHOLE Website for corporated E-Mail addresses and put any of them
in the Cc: of my ABUSE autoresponder...  which normaly forward this crap
only to the right abse addresses...


this is only the webside owner, not his hoster


After geting arround 1800 spams over the Debian mailinglists which where
multiplid by the factor 37 by me with a friendly text for the recipients
to contact there collegous to stop theire spaming customer


way to go there


Arround 2 days later the offenting customers domain  was  offline  after
more then one year of spaming.


super


I think, my 37 x 1800 abuse mails have hit the nerv of someone!


corp with did no log scan


The problem is now, such idiots require heavy manual intervention.


from.pm solves it for me

--
xpoint http://www.unicom.com/pw/reply-to-harmful.html



Re: Bogus mails from hijacked accounts

2010-03-13 Thread Michelle Konzack
Good evening,

Am 2010-03-13 14:46:35, schrieb Benny Pedersen:
 report them on rfc-ignorant.org

I know it, but the way you have to report it is to long...

 Ome tim ago we had a problem on a bnch of  Debian  mailinglists  with  a
 persupermarket and after the ISP was not responsive, I  have  spidered
 theire WHOLE Website for corporated E-Mail addresses and put any of them
 in the Cc: of my ABUSE autoresponder...  which normaly forward this crap
 only to the right abse addresses...
 this is only the webside owner, not his hoster

Oops, I mean, I have send the messages to the hoster which is the bigest
ISP  of  Bresil  since  ANY  messages  to  petsupermarket  failed  and
ab...@hoster was not responsive.

So, writing to ANY employees of a hoster will hopefuly work.
It is nearly impossibel that 100% of the staff is incompetent.

 I think, my 37 x 1800 abuse mails have hit the nerv of someone!
 corp with did no log scan

ACK!  --  Unfortunately I know many of them.

 The problem is now, such idiots require heavy manual intervention.
 from.pm solves it for me

Unfortunately the tries of the Debian Listmasters to
contact petsupermarket whee not succesfull.

Sometimes it requires the HAMMER method.

Thanks, Greetings and nice Day/Evening
Michelle Konzack
Systemadministrator
24V Electronic Engineer
Tamay Dogan Network
Debian GNU/Linux Consultant

-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
http://www.tamay-dogan.net/ Michelle Konzack
http://www.can4linux.org/   Apt. 917
http://www.flexray4linux.org/   50, rue de Soultz
Jabber linux4miche...@jabber.ccc.de   67100 Strabourg/France
IRC#Debian (irc.icq.com)  Tel. DE: +49 177 9351947
ICQ#328449886 Tel. FR: +33  6  61925193


signature.pgp
Description: Digital signature


Re: Bogus mails from hijacked accounts

2010-03-12 Thread ram

On Wed, 2010-03-10 at 13:37 -0600, Dennis B. Hopp wrote:
 We seem to be having a problem where clients that we interact with
 regularly are having their hotmail/gmail/yahoo accounts hijacked.  We
 are receiving e-mails from their accounts that legitimately go through
 the correct servers (hotmail,yahoo, etc.) and so they get passed through
 our spam filters.  The messages have different bodies but basically say
 the same thing that they were on vacation and had all their money stolen
 so they need to have money wire transferred to them.
 
 Obviously we just have to tell the clients that they need to deal with
 the various e-mail providers, but is there an effective way that I can
 filter these messages out before my users see them without blacklisting
 the address?  In one case I had probably 15 users that received the same
 message and naturally they freaked out.
 

Why only free accounts , The 419'ers hijack legitimate corporate
accounts too. Again , As Ips have good reputation and the mails land in
the inbox 
I think the only way of handling this to send proper abuse reports 

Probably the free mail providers are less reponsive to abuse reports
than corporate ones. 

Thanks
Ram





Re: Bogus mails from hijacked accounts

2010-03-12 Thread Dennis B. Hopp

 describe FORGED_HOTMAIL   Hotmail with non-Hotmail Reply-to address
 header   __FORGED_HM1 From ~= /\...@hotmail\.com/i
 header   __FORGED_HM2 Reply-to ~= /\...@hotmail\.com/i
 meta FORGED_HOTMAIL   (__FORGED_HM1  !__FORGED_HM2)
 scoreFORGED_HOTMAIL   5.0
 
 and write cookie cutter rules for Yahoo and Gmail. 
 
 OTOH if you're happy that a Japanese test won't generate FPs you can
 cover all three ISPs with one rule:  
 
 describe FORGED_FROM Hotmail,Yahoo or Google with Japanese Reply-to 
 header   __FF1   From ~= /\@(hotmail|yahoo|gmail)\.com/i
 header   __FF2   Reply-to ~= /\.jp/i
 meta FORGED_FROM (__FF1  __FF2)
 scoreFORGED_FROM 5.0
 
 Of course, if its just a few Japanese ISPs being used you can easily
 make _FF2 more specific.
 

I tried this for yahoo...

describe FORGED_YAHOO Yahoo with non-Yahoo Reply-to address
header   __FORGED_YH1 From =~ /\...@yahoo\.com/i
header   __FORGED_YH2 Reply-to =~ /\...@yahoo\.com/i
meta FORGED_YAHOO (__FORGED_YH1  !__FORGED_YH2)
scoreFORGED_YAHOO 0.25

And it triggered on a message with the following header

http://pastebin.com/qs18DpYn

My best guess is it is using the In-Reply-To header...is there a way
to differentiate In-Reply-To and Reply-To ?

Thanks,

--Dennis



Re: [sa] Re: Bogus mails from hijacked accounts

2010-03-12 Thread Charles Gregory

On Fri, 12 Mar 2010, Dennis B. Hopp wrote:

describe FORGED_YAHOO Yahoo with non-Yahoo Reply-to address
header   __FORGED_YH1 From =~ /\...@yahoo\.com/i
header   __FORGED_YH2 Reply-to =~ /\...@yahoo\.com/i
meta FORGED_YAHOO (__FORGED_YH1  !__FORGED_YH2)


The problem with this is that the !__FORGED_YH2 matches
when there is *NO* Reply-To header at all!

You need something like this:

header __FORGED_YH2 Reply-To =~ /\@([^y]|y[^a]|ya[^h]|yah[^o])/i
meta FORGED_YAHOO (__FORGED_YH1  __FORGED_YH2)

(remove the negation from the meta)
This directly tests for an existing Reply-To specifically to a domain
that does not begin with 'yaho'.

However, keep in mind that the headers for *this* mailing list would 
trigger your rule. So you will also need to meta this with a rule that 
tests for yahoo mail server being the sending SMTP client


Gets tricky, doesn't it?

- C



Re: [sa] Re: Bogus mails from hijacked accounts

2010-03-12 Thread Dennis B. Hopp


 The problem with this is that the !__FORGED_YH2 matches
 when there is *NO* Reply-To header at all!
 
 You need something like this:
 
 header __FORGED_YH2 Reply-To =~ /\@([^y]|y[^a]|ya[^h]|yah[^o])/i
 meta FORGED_YAHOO (__FORGED_YH1  __FORGED_YH2)
 
 (remove the negation from the meta)
 This directly tests for an existing Reply-To specifically to a domain
 that does not begin with 'yaho'.

Wouldn't that meta rule trigger when the reply-to contained 'yaho'?  I
want to trigger when the from contains yahoo.com and the reply-to does
not.

 
 However, keep in mind that the headers for *this* mailing list would 
 trigger your rule. So you will also need to meta this with a rule that 
 tests for yahoo mail server being the sending SMTP client
 

Good point.  I didn't think about that..

--Dennis



Re: [sa] Re: Bogus mails from hijacked accounts

2010-03-12 Thread Dennis B. Hopp

On Fri, 2010-03-12 at 12:52 -0600, Dennis B. Hopp wrote:
 
  The problem with this is that the !__FORGED_YH2 matches
  when there is *NO* Reply-To header at all!
  
  You need something like this:
  
  header __FORGED_YH2 Reply-To =~ /\@([^y]|y[^a]|ya[^h]|yah[^o])/i
  meta FORGED_YAHOO (__FORGED_YH1  __FORGED_YH2)
  
  (remove the negation from the meta)
  This directly tests for an existing Reply-To specifically to a domain
  that does not begin with 'yaho'.
 
 Wouldn't that meta rule trigger when the reply-to contained 'yaho'?  I
 want to trigger when the from contains yahoo.com and the reply-to does
 not.

Nevermind..the '^' inside brackets negates..I get it now..



Re: [sa] Re: Bogus mails from hijacked accounts

2010-03-12 Thread Karsten Bräckelmann
On Fri, 2010-03-12 at 13:19 -0500, Charles Gregory wrote:
  describe FORGED_YAHOO Yahoo with non-Yahoo Reply-to address
  header   __FORGED_YH1 From =~ /\...@yahoo\.com/i
  header   __FORGED_YH2 Reply-to =~ /\...@yahoo\.com/i
  meta FORGED_YAHOO (__FORGED_YH1  !__FORGED_YH2)
 
 The problem with this is that the !__FORGED_YH2 matches
 when there is *NO* Reply-To header at all!
 
 You need something like this:
 
 header __FORGED_YH2 Reply-To =~ /\@([^y]|y[^a]|ya[^h]|yah[^o])/i
 meta FORGED_YAHOO (__FORGED_YH1  __FORGED_YH2)

Creative...

However, a better and likely more comprehensible solution would be, to
add an if-unset constraint to the previous rule-set. :)  Adding
  [if-unset: @yahoo.com]

at the end of the YH2 rule will prevent the match on a missing Reply-To
header, by faking one in its absence.


Of course, there's also always the solution of adding another sub-rule
to the meta that tests a header for existence.
  header __HAS_REPLY_TO  exists:Reply-To

But that's just plain boring rules, no funky REs there. Sorry. ;)

  guenther


-- 
char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4;
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1:
(c=*++x); c128  (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}



Re: Bogus mails from hijacked accounts

2010-03-12 Thread Michelle Konzack
Hello,

Am 2010-03-12 13:38:57, schrieb Benny Pedersen:
 On tor 11 mar 2010 19:52:01 CET, Michelle Konzack wrote
 
 I mean, on one of my domains tdwave.net it should be ALWAYS  the  same
 From: and Reply-To:.
 
 i have a plugin that does this, contact me offlist if you like to
 have it, its alpha stable here, warning i am not a perl geek yet :=)
 
 but why not remove reply-to in all outgoing mails ?, and make sure
 all users need to verify the reply-to email is there own, still not
 perfect but tigthen it more

I mean exactly, IF Reply-To: is set, verify, that it match the sender,
otherwise reject if it does not match From:.

Thanks, Greetings and nice Day/Evening
Michelle Konzack
Systemadministrator
24V Electronic Engineer
Tamay Dogan Network
Debian GNU/Linux Consultant

-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
http://www.tamay-dogan.net/ Michelle Konzack
http://www.can4linux.org/   Apt. 917
http://www.flexray4linux.org/   50, rue de Soultz
Jabber linux4miche...@jabber.ccc.de   67100 Strabourg/France
IRC#Debian (irc.icq.com)  Tel. DE: +49 177 9351947
ICQ#328449886 Tel. FR: +33  6  61925193


signature.pgp
Description: Digital signature


Re: Bogus mails from hijacked accounts

2010-03-12 Thread Michelle Konzack
Hello,

Am 2010-03-12 18:24:14, schrieb ram:
 Why only free accounts , The 419'ers hijack legitimate corporate
 accounts too. Again , As Ips have good reputation and the mails land in
 the inbox 
 I think the only way of handling this to send proper abuse reports 
 
 Probably the free mail providers are less reponsive to abuse reports
 than corporate ones. 

The roblem is, accourding to the RFCs, ISP must have an abuse address,
but do you have ever tried this with a corporated domain?

Even postmaster is rejected on most domains.

Ome tim ago we had a problem on a bnch of  Debian  mailinglists  with  a
persupermarket and after the ISP was not responsive, I  have  spidered
theire WHOLE Website for corporated E-Mail addresses and put any of them
in the Cc: of my ABUSE autoresponder...  which normaly forward this crap
only to the right abse addresses...

After geting arround 1800 spams over the Debian mailinglists which where
multiplid by the factor 37 by me with a friendly text for the recipients
to contact there collegous to stop theire spaming customer

Arround 2 days later the offenting customers domain  was  offline  after
more then one year of spaming.

I think, my 37 x 1800 abuse mails have hit the nerv of someone!

The problem is now, such idiots require heavy manual intervention.

The only solution is:

1)  Check wheher a Reply-To: is set
2)  If no, continue normal.
3)  If yes, check it against the From: and
if it is different reject this crap

Thanks, Greetings and nice Day/Evening
Michelle Konzack
Systemadministrator
24V Electronic Engineer
Tamay Dogan Network
Debian GNU/Linux Consultant

-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
http://www.tamay-dogan.net/ Michelle Konzack
http://www.can4linux.org/   Apt. 917
http://www.flexray4linux.org/   50, rue de Soultz
Jabber linux4miche...@jabber.ccc.de   67100 Strabourg/France
IRC#Debian (irc.icq.com)  Tel. DE: +49 177 9351947
ICQ#328449886 Tel. FR: +33  6  61925193


signature.pgp
Description: Digital signature


Re: Bogus mails from hijacked accounts

2010-03-12 Thread hamann . w
Michelle Konzack wrote:
 
 I mean exactly, IF Reply-To: is set, verify, that it match the sender,
 otherwise reject if it does not match From:.
 
 Thanks, Greetings and nice Day/Evening
 Michelle Konzack
 Systemadministrator
 24V Electronic Engineer
 Tamay Dogan Network
 Debian GNU/Linux Consultant
 
Hi Michelle,

what exactly is wrong with a reply-to that is not the sender?
Of course, I cannot see much sense in a private email sending from hotmail.jp 
and
wanting replies to yahoo.cn
On the other side, it is a natural way for somebody's web forms: the from 
should be valid,
so it would match the webserver, and the reply-to is the person completing the 
form

Wolfgang



Re: Bogus mails from hijacked accounts

2010-03-11 Thread Ned Slider

David B Funk wrote:

On Wed, 10 Mar 2010, Dennis B. Hopp wrote:


I have put a sample at:

http://pastebin.com/9BDXrxmm

Note I did change the real e-mail address in this message but the
hotmail address used is valid just masked.


Look at that X-Originating-IP: [41.155.87.236] header, its a dial-up
pool in Lagos Nigeria.

It may seem stereotyped, but it's amazing the percentage of this kind
of spam that -does- come out of that part of the world.



How about:

# Catch spam originating from 41.0.0.0/8 (Africa, incl S.Africa)
describeLOCAL_ORIG_FROM_41  Originates from 41.0.0.0/8
header  LOCAL_ORIG_FROM_41  X-Originating-IP =~ /\[41\./

Unless you're expecting mail originating from Africa, you can go further 
 and detect all mail injected from 41/8 with few FPs.


# Catch spam injected from 41.0.0.0/8 (Africa, incl S.Africa)
describeLOCAL_RCVD_FROM_41  Received from 41.0.0.0/8
header  LOCAL_RCVD_FROM_41  Received =~ /\[41\./

I've found these safe to score quite highly, but YMMV so score as suits 
your mail flow.





Re: Bogus mails from hijacked accounts

2010-03-11 Thread Brian
On Thu, 2010-03-11 at 12:26 +, Ned Slider wrote:
 David B Funk wrote:
  On Wed, 10 Mar 2010, Dennis B. Hopp wrote:
 
  I have put a sample at:
 
  http://pastebin.com/9BDXrxmm
 
  Note I did change the real e-mail address in this message but the
  hotmail address used is valid just masked.
  
  Look at that X-Originating-IP: [41.155.87.236] header, its a dial-up
  pool in Lagos Nigeria.
  
  It may seem stereotyped, but it's amazing the percentage of this kind
  of spam that -does- come out of that part of the world.
  
 
 How about:
 
 # Catch spam originating from 41.0.0.0/8 (Africa, incl S.Africa)
 describe  LOCAL_ORIG_FROM_41  Originates from 41.0.0.0/8
 headerLOCAL_ORIG_FROM_41  X-Originating-IP =~ /\[41\./
 
 Unless you're expecting mail originating from Africa, you can go further 
   and detect all mail injected from 41/8 with few FPs.
 
 # Catch spam injected from 41.0.0.0/8 (Africa, incl S.Africa)
 describe  LOCAL_RCVD_FROM_41  Received from 41.0.0.0/8
 headerLOCAL_RCVD_FROM_41  Received =~ /\[41\./
 
 I've found these safe to score quite highly, but YMMV so score as suits 
 your mail flow.
 
 
Good quality advice from Ned (LOL). Just make sure none of your users
will be communicating with South Africa during the world cup..



Re: Bogus mails from hijacked accounts

2010-03-11 Thread Dennis B. Hopp

 1)  Spammers rotate sender addresses and hijacked account info more 
 often than most of us change our underwear.  An account *may* get 
 reused;  chances are it'll be months before it does, and the spammers 
 will have rotated through hundreds or thousands of others - both 
 phish-cracked and those set up just to send their junk.  Blacklisting a 
 sender is reduced to blocking the persistent friend-of-a-friend who 
 refuses to remove you from the endless stream of chain-forwards, and 
 legitimate-but-totally-clueless mailing list operators who can't figure 
 out how to unsubscribe you from their list.  :(
 
 2)  You noted originally that these appear to be fully legitimate 
 freemail accounts, legitimately used in the past to correspond with your 
 customers/clients, that have been compromised and then used to send 
 spam.  How do you propose to still allow the legitimate account holders 
 to email your clients if you blacklist the sender?
 

I don't want to blacklist the address, hence the reason why in my
original e-mail I said other then blacklisting.  I know blacklisting
would block these bogus e-mails as well as legit e-mails as soon as the
clients get access back (they currently don't have access to their
accounts because their passwords have been changed).  


 
 Martin's suggestion followup should point you in the right direction. 
 Sets of phrase rules (how similar are these messages?  do you have ten 
 or fifteen you can compare sentence-by-sentence?) with low scores will 
 likely help some too.  Meta rules that bump the score up depending on 
 how many phrases hit, or phrase+mismatched-sender/reply also work 
 tolerably well on this class of spam... if you can get enough samples to 
 build a complete enough set of phrase rules.

I'm going to look at what Martin suggested and compare it to what
samples I have.

Thanks,

--Dennis




Re: Bogus mails from hijacked accounts

2010-03-11 Thread Dennis B. Hopp

 Its not conditional, just using a meta rule and negating the Reply-to
 test in the meta:
 
 describe FORGED_HOTMAIL   Hotmail with non-Hotmail Reply-to address
 header   __FORGED_HM1 From ~= /\...@hotmail\.com/i
 header   __FORGED_HM2 Reply-to ~= /\...@hotmail\.com/i
 meta FORGED_HOTMAIL   (__FORGED_HM1  !__FORGED_HM2)
 scoreFORGED_HOTMAIL   5.0
 
 and write cookie cutter rules for Yahoo and Gmail. 
 
 OTOH if you're happy that a Japanese test won't generate FPs you can
 cover all three ISPs with one rule:  
 
 describe FORGED_FROM Hotmail,Yahoo or Google with Japanese Reply-to 
 header   __FF1   From ~= /\@(hotmail|yahoo|gmail)\.com/i
 header   __FF2   Reply-to ~= /\.jp/i
 meta FORGED_FROM (__FF1  __FF2)
 scoreFORGED_FROM 5.0

Thanks Martin.  This is actually far simpler then I was thinking it
would be.

--Dennis



Re: Bogus mails from hijacked accounts

2010-03-11 Thread Brian
On Thu, 2010-03-11 at 07:55 -0600, Dennis B. Hopp wrote:
  1)  Spammers rotate sender addresses and hijacked account info more 
  often than most of us change our underwear.  An account *may* get 
  reused;  chances are it'll be months before it does, and the spammers 
  will have rotated through hundreds or thousands of others - both 
  phish-cracked and those set up just to send their junk.  Blacklisting a 
  sender is reduced to blocking the persistent friend-of-a-friend who 
  refuses to remove you from the endless stream of chain-forwards, and 
  legitimate-but-totally-clueless mailing list operators who can't figure 
  out how to unsubscribe you from their list.  :(
  
  2)  You noted originally that these appear to be fully legitimate 
  freemail accounts, legitimately used in the past to correspond with your 
  customers/clients, that have been compromised and then used to send 
  spam.  How do you propose to still allow the legitimate account holders 
  to email your clients if you blacklist the sender?
  
 
 I don't want to blacklist the address, hence the reason why in my
 original e-mail I said other then blacklisting.  I know blacklisting
 would block these bogus e-mails as well as legit e-mails as soon as the
 clients get access back (they currently don't have access to their
 accounts because their passwords have been changed).  
 
 
  
  Martin's suggestion followup should point you in the right direction. 
  Sets of phrase rules (how similar are these messages?  do you have ten 
  or fifteen you can compare sentence-by-sentence?) with low scores will 
  likely help some too.  Meta rules that bump the score up depending on 
  how many phrases hit, or phrase+mismatched-sender/reply also work 
  tolerably well on this class of spam... if you can get enough samples to 
  build a complete enough set of phrase rules.
 
 I'm going to look at what Martin suggested and compare it to what
 samples I have.
 
 Thanks,
 
 --Dennis
 
Don't miss the major key in the body - that is 'Western Union'. I don't
know how much legitimate business you do with WU (or Moneygram for that
matter) but it may well be worthy of a half decent score.

 



Re: Bogus mails from hijacked accounts

2010-03-11 Thread Kris Deugau

Dennis B. Hopp wrote:

I don't want to blacklist the address, hence the reason why in my
original e-mail I said other then blacklisting.


Whups, got your original message confused with something you replied 
with later.



 I know blacklisting
would block these bogus e-mails as well as legit e-mails as soon as the
clients get access back (they currently don't have access to their
accounts because their passwords have been changed).


Ouch.  :(  Offhand, I'd say you might as well go ahead and blacklist 
them anyway, because if the passwords on these freemail accounts have 
been changed, I don't think there's much chance the original users will 
get access back.  It might be a different story if the accounts are 
actually paid accounts.


-kgd


Re: Bogus mails from hijacked accounts

2010-03-11 Thread Martin Gregorie
On Thu, 2010-03-11 at 07:55 -0600, Dennis B. Hopp wrote:
 I'm going to look at what Martin suggested and compare it to what
 samples I have.
 
FWIW, I have 2 or three portmanteau rules that are effectively
collections of misspelled words (such as v1agra, improove, ...),
medspamming phrases, throwaway URI patterns, etc that I've built up from
a number of spams. All are scored low (around 0.01) so I can see them
fire but with little impact in the overall score. I use them in
meta-rules with rather higher scores. This approach is surprisingly
effective at catching previously unseen spam, due to spammers not being
very creative when it comes to generating readable misspelled words or
their insistence on continuing to send spam via inappropriate channels,
such as technical mailing lists.
 

Martin




Re: Bogus mails from hijacked accounts

2010-03-11 Thread Martin Gregorie
On Thu, 2010-03-11 at 10:22 -0500, Kris Deugau wrote:

 Ouch.  :(  Offhand, I'd say you might as well go ahead and blacklist 
 them anyway, because if the passwords on these freemail accounts have 
 been changed, I don't think there's much chance the original users will 
 get access back.  It might be a different story if the accounts are 
 actually paid accounts.
 
I don't think the accounts were hijacked: the headers showed that the
messages the OP posted were not sent from the domain hosting the mail
accounts. It looked to me as if somebody has sold on lists of valid
hotmail etc. accounts.

I smell an inside job, or at least some careful preparation, because the
OP reckons that these accounts (forged as sender) were paired with valid
accounts he hosts that would be used by the owner of the forged account.
The messages I saw took the form:

-
From:forged hotmail/yahoo/gmail account
To:  same person's account at the OP's ISP
Subject: Help!

I was ROBBED of my money and cards but not my passport. PLEASE
send me $$$ via Western Union.
 
Signed: me.myself
-

A scam of this type needs to be pretty tightly targeted to work. The
scammer would need at least a matched pair of addresses and a good
probability that the supposed sender could be somewhere near the place
where the alleged robbery was said to have happened.


Martin




Re: Bogus mails from hijacked accounts

2010-03-11 Thread Dave Pooser
 A scam of this type needs to be pretty tightly targeted to work. The
 scammer would need at least a matched pair of addresses and a good
 probability that the supposed sender could be somewhere near the place
 where the alleged robbery was said to have happened.

If I've got access to your freemail account, I've got access to your address
book. The one of these I encountered at $DAYJOB was sent to the account
owner's wife's ex-husband-- not my first choice when asking for emergency
funds. The email also claimed he was traveling in London-- the guy AFAIK
hasn't left Texas, let alone the US, in the past few years-- and used a
number of phrases that a native speaker of American so-called-English
wouldn't.
-- 
Dave Pooser
Cat-Herder-in-Chief, Pooserville.com
...Life is not a journey to the grave with the intention of arriving
safely in one pretty and well-preserved piece, but to slide across the
finish line broadside, thoroughly used up, worn out, leaking oil, and
shouting GERONIMO!!! -- Bill McKenna




Re: Bogus mails from hijacked accounts

2010-03-11 Thread Martin Gregorie
On Thu, 2010-03-11 at 11:56 -0600, Dave Pooser wrote:
  A scam of this type needs to be pretty tightly targeted to work. The
  scammer would need at least a matched pair of addresses and a good
  probability that the supposed sender could be somewhere near the place
  where the alleged robbery was said to have happened.
 
 If I've got access to your freemail account, I've got access to your address
 book.

...and I suppose the same would apply to social networks. I don't use
either, so am somewhat clueless about what goodies are available if you
can access their accounts.

  The one of these I encountered at $DAYJOB was sent to the account
 owner's wife's ex-husband-- not my first choice when asking for emergency
 funds. The email also claimed he was traveling in London-- the guy AFAIK
 hasn't left Texas, let alone the US, in the past few years-- and used a
 number of phrases that a native speaker of American so-called-English
 wouldn't.

OK, looks like I hugely overestimated the intelligence of recipients of
such scams and hence the care needed to target an attack.


Martin




Re: Bogus mails from hijacked accounts

2010-03-11 Thread Dennis B. Hopp

 I don't think the accounts were hijacked: the headers showed that the
 messages the OP posted were not sent from the domain hosting the mail
 accounts. It looked to me as if somebody has sold on lists of valid
 hotmail etc. accounts.
 
 I smell an inside job, or at least some careful preparation, because the
 OP reckons that these accounts (forged as sender) were paired with valid
 accounts he hosts that would be used by the owner of the forged account.
 The messages I saw took the form:

We got one owner of the hijacked accounts to admit he got an e-mail that
basically said Hi we are trying to get rid of dead accounts so please
click here to verify your information.  The site then very nicely asked
for his username/password which he gave and then viola, no more access
to his account.  The message was then sent to every address in his
address book (which is why many of my users got the same message). 

Sadly, we have had this happen a couple of times with hotmail and yahoo 
addresses.

What can I say, some of our clients aren't exactly the most tech savvy.

--Dennis



Re: Bogus mails from hijacked accounts

2010-03-11 Thread Dennis B. Hopp

 ...and I suppose the same would apply to social networks. I don't use
 either, so am somewhat clueless about what goodies are available if you
 can access their accounts.
 

I have some free e-mail accounts that I use as throw away accounts.
When a site just HAS to have a valid e-mail so you can read the news
article or whatever.  I might login to the accounts about once a month.

   The one of these I encountered at $DAYJOB was sent to the account
  owner's wife's ex-husband-- not my first choice when asking for emergency
  funds. The email also claimed he was traveling in London-- the guy AFAIK
  hasn't left Texas, let alone the US, in the past few years-- and used a
  number of phrases that a native speaker of American so-called-English
  wouldn't.
 
 OK, looks like I hugely overestimated the intelligence of recipients of
 such scams and hence the care needed to target an attack.
 

It's a sad thing, but a lot of people fall for stupid scams every day...



Re: Bogus mails from hijacked accounts

2010-03-11 Thread Fosforo
I've seen an increase of pop3 dictionary attacks. The cracking daemons
usually are running from china.

[]s Fosforo

--
O caminho do homem justo é rodeado por todos os lados pelas
injustiças dos egoístas e pela tirania dos homens de mal. Abençoado é
aquele que, em nome da caridade e da boa-vontade pastoreia os fracos
pelo vale da escuridão, para quem ele é verdadeiramente seu irmão
protetor, e aquele que encontra suas crianças perdidas. E Eu atacarei,
com grande vingança e raiva furiosa àqueles que tentam envenenar e
destruir meus irmãos. E você saberá: chamo-me o Senhor quando minha
vingança cair sobre você.

-Jules (e um tal de Ezequiel)



2010/3/10 Dennis B. Hopp dh...@coreps.com:
 We seem to be having a problem where clients that we interact with
 regularly are having their hotmail/gmail/yahoo accounts hijacked.  We
 are receiving e-mails from their accounts that legitimately go through
 the correct servers (hotmail,yahoo, etc.) and so they get passed through
 our spam filters.  The messages have different bodies but basically say
 the same thing that they were on vacation and had all their money stolen
 so they need to have money wire transferred to them.

 Obviously we just have to tell the clients that they need to deal with
 the various e-mail providers, but is there an effective way that I can
 filter these messages out before my users see them without blacklisting
 the address?  In one case I had probably 15 users that received the same
 message and naturally they freaked out.

 I have put a sample at:

 http://pastebin.com/9BDXrxmm

 Note I did change the real e-mail address in this message but the
 hotmail address used is valid just masked.

 The message doesn't hit any rules of significance on my system.

 BAYES_00=-1.9,FREEMAIL_FROM=0.001,HTML_MESSAGE=0.001,RCVD_IN_DNSWL_NONE=-0.0001,SPF_PASS=-0.001,T_RP_MATCHES_RCVD=-0.01,T_TO_NO_BRKTS_FREEMAIL=0.01


 Thanks

 --Dennis




Re: Bogus mails from hijacked accounts

2010-03-11 Thread Michelle Konzack
Hello,

Am 2010-03-10 13:37:20, schrieb Dennis B. Hopp:
 We seem to be having a problem where clients that we interact with
 regularly are having their hotmail/gmail/yahoo accounts hijacked.  We
 are receiving e-mails from their accounts that legitimately go through
 the correct servers (hotmail,yahoo, etc.) and so they get passed through
 our spam filters.  The messages have different bodies but basically say
 the same thing that they were on vacation and had all their money stolen
 so they need to have money wire transferred to them.
 
 Obviously we just have to tell the clients that they need to deal with
 the various e-mail providers, but is there an effective way that I can
 filter these messages out before my users see them without blacklisting
 the address?  In one case I had probably 15 users that received the same
 message and naturally they freaked out.

I have such problem too, but because  spam  is  filtered  in  the  users
account from procmail include, I use a  global  procmail  include  which
check for such problems, speak, I use  a  global  SA  installation  with
striped down checks plus some additional procmail recipes and after this
is passed, it goes to the second stage into the uses account.

If I detect this on legitimate domains the user and  abuse  will  be
informed through an automated bounce.

Note:   I have on the domain tdwave.net arround 2000 users and if
I do not automated spam processing, I have to look  manualy
at more the 180.000 spams per day.  = ~2 mesage per seond.

Thanks, Greetings and nice Day/Evening
Michelle Konzack
Systemadministrator
24V Electronic Engineer
Tamay Dogan Network
Debian GNU/Linux Consultant

-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
http://www.tamay-dogan.net/ Michelle Konzack
http://www.can4linux.org/   Apt. 917
http://www.flexray4linux.org/   50, rue de Soultz
Jabber linux4miche...@jabber.ccc.de   67100 Strabourg/France
IRC#Debian (irc.icq.com)  Tel. DE: +49 177 9351947
ICQ#328449886 Tel. FR: +33  6  61925193


signature.pgp
Description: Digital signature


Re: Bogus mails from hijacked accounts

2010-03-11 Thread Michelle Konzack
Hello Martin,

Am 2010-03-10 22:13:59, schrieb Martin Gregorie:
 describe FORGED_HOTMAIL   Hotmail with non-Hotmail Reply-to address
 header   __FORGED_HM1 From ~= /\...@hotmail\.com/i
 header   __FORGED_HM2 Reply-to ~= /\...@hotmail\.com/i
 meta FORGED_HOTMAIL   (__FORGED_HM1  !__FORGED_HM2)
 scoreFORGED_HOTMAIL   5.0

How can this simplified with any SLD/TLDs?

I mean, on one of my domains tdwave.net it should be ALWAYS  the  same
From: and Reply-To:.

Thanks, Greetings and nice Day/Evening
Michelle Konzack
Systemadministrator
24V Electronic Engineer
Tamay Dogan Network
Debian GNU/Linux Consultant

-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
http://www.tamay-dogan.net/ Michelle Konzack
http://www.can4linux.org/   Apt. 917
http://www.flexray4linux.org/   50, rue de Soultz
Jabber linux4miche...@jabber.ccc.de   67100 Strabourg/France
IRC#Debian (irc.icq.com)  Tel. DE: +49 177 9351947
ICQ#328449886 Tel. FR: +33  6  61925193


signature.pgp
Description: Digital signature


Bogus mails from hijacked accounts

2010-03-10 Thread Dennis B. Hopp
We seem to be having a problem where clients that we interact with
regularly are having their hotmail/gmail/yahoo accounts hijacked.  We
are receiving e-mails from their accounts that legitimately go through
the correct servers (hotmail,yahoo, etc.) and so they get passed through
our spam filters.  The messages have different bodies but basically say
the same thing that they were on vacation and had all their money stolen
so they need to have money wire transferred to them.

Obviously we just have to tell the clients that they need to deal with
the various e-mail providers, but is there an effective way that I can
filter these messages out before my users see them without blacklisting
the address?  In one case I had probably 15 users that received the same
message and naturally they freaked out.

I have put a sample at:

http://pastebin.com/9BDXrxmm

Note I did change the real e-mail address in this message but the
hotmail address used is valid just masked.

The message doesn't hit any rules of significance on my system.

BAYES_00=-1.9,FREEMAIL_FROM=0.001,HTML_MESSAGE=0.001,RCVD_IN_DNSWL_NONE=-0.0001,SPF_PASS=-0.001,T_RP_MATCHES_RCVD=-0.01,T_TO_NO_BRKTS_FREEMAIL=0.01


Thanks

--Dennis



Re: Bogus mails from hijacked accounts

2010-03-10 Thread Martin Gregorie
On Wed, 2010-03-10 at 13:37 -0600, Dennis B. Hopp wrote:

 Obviously we just have to tell the clients that they need to deal with
 the various e-mail providers, but is there an effective way that I can
 filter these messages out before my users see them without blacklisting
 the address?

There's nothing in SA that can blacklist a sending MTA, so blacklisting
can't happen unless you've added something to your MTA set-up that does
auto-blacklisting.

The question then comes down to marking the message as spam and dealing
with it however you normally deal with spam. You'll probably need custom
rule(s) to handle that. You say the message bodies are quite variable,
but I notice that the Reply-to: header doesn't remotely match the From:
header. Is this a common factor?

If it is, and the body texts have no common features that could also be
used, the only obvious approach would be a rule for each forged sending
domain that fires if the sending domain doesn't match the Reply-to
domain. 

Only you can know if these rules would cause false positives: I can't
possibly tell from a single sample message.


Martin
 




Re: Bogus mails from hijacked accounts

2010-03-10 Thread Dennis B. Hopp

On Wed, 2010-03-10 at 20:22 +, Martin Gregorie wrote:
 On Wed, 2010-03-10 at 13:37 -0600, Dennis B. Hopp wrote:
 
  Obviously we just have to tell the clients that they need to deal with
  the various e-mail providers, but is there an effective way that I can
  filter these messages out before my users see them without blacklisting
  the address?
 
 There's nothing in SA that can blacklist a sending MTA, so blacklisting
 can't happen unless you've added something to your MTA set-up that does
 auto-blacklisting.
 

I meant blacklisting the sender address, not the MTA.

 The question then comes down to marking the message as spam and dealing
 with it however you normally deal with spam. You'll probably need custom
 rule(s) to handle that. You say the message bodies are quite variable,
 but I notice that the Reply-to: header doesn't remotely match the From:
 header. Is this a common factor?
 

The ones that I have seen the reply-to doesn't match the from and I
think the reply-to have all been something.jp

 If it is, and the body texts have no common features that could also be
 used, the only obvious approach would be a rule for each forged sending
 domain that fires if the sending domain doesn't match the Reply-to
 domain. 
 

There isn't anything in common that I can see that wouldn't be
susceptible to false positives.  One even left the clients signature
intact.  I've written fairly simple custom rules before but I'm not sure
how to do conditional rules.  I'll have to dig into the docs a little
more.
 
 Only you can know if these rules would cause false positives: I can't
 possibly tell from a single sample message.
 

I wasn't expecting anybody to give me a magic rule that would fix it,
just suggestions since I would only be able to blacklist the sender
address after the e-mail had been received and I was notified of the
problem.  And obviously blacklisting all of gmail/hotmail/yahoo isn't an
option.

Thanks,

--Dennis



Re: Bogus mails from hijacked accounts

2010-03-10 Thread Martin Gregorie
On Wed, 2010-03-10 at 15:08 -0600, Dennis B. Hopp wrote:
 I meant blacklisting the sender address, not the MTA.
 
From what you're describing the senders are all forged by somebody who
bought or stole a list of valid hotmail etc. addresses and the
corresponding addresses in your domain, so blacklisting anything is
probably a bad idea because it wouldn't do anything except annoy the
actual owner of the address.
 
 There isn't anything in common that I can see that wouldn't be
 susceptible to false positives.  One even left the clients signature
 intact.  I've written fairly simple custom rules before but I'm not sure
 how to do conditional rules.  I'll have to dig into the docs a little
 more.

Its not conditional, just using a meta rule and negating the Reply-to
test in the meta:

describe FORGED_HOTMAIL   Hotmail with non-Hotmail Reply-to address
header   __FORGED_HM1 From ~= /\...@hotmail\.com/i
header   __FORGED_HM2 Reply-to ~= /\...@hotmail\.com/i
meta FORGED_HOTMAIL   (__FORGED_HM1  !__FORGED_HM2)
scoreFORGED_HOTMAIL   5.0

and write cookie cutter rules for Yahoo and Gmail. 

OTOH if you're happy that a Japanese test won't generate FPs you can
cover all three ISPs with one rule:  

describe FORGED_FROM Hotmail,Yahoo or Google with Japanese Reply-to 
header   __FF1   From ~= /\@(hotmail|yahoo|gmail)\.com/i
header   __FF2   Reply-to ~= /\.jp/i
meta FORGED_FROM (__FF1  __FF2)
scoreFORGED_FROM 5.0

Of course, if its just a few Japanese ISPs being used you can easily
make _FF2 more specific.


Martin




Re: Bogus mails from hijacked accounts

2010-03-10 Thread Kris Deugau

Dennis B. Hopp wrote:

On Wed, 2010-03-10 at 20:22 +, Martin Gregorie wrote:

On Wed, 2010-03-10 at 13:37 -0600, Dennis B. Hopp wrote:

Obviously we just have to tell the clients that they need to deal with
the various e-mail providers, but is there an effective way that I can
filter these messages out before my users see them without blacklisting
the address?


There's nothing in SA that can blacklist a sending MTA, so blacklisting
can't happen unless you've added something to your MTA set-up that does
auto-blacklisting.


I meant blacklisting the sender address, not the MTA.


Welcome to Whack-A-Spammer!  Here's your pea-shooter;  the targets are 
behind 3 feet of concrete on the other side of this mile-wide canyon.


Sarcasm aside, there are two problems with blacklisting the sender to 
block spam:


1)  Spammers rotate sender addresses and hijacked account info more 
often than most of us change our underwear.  An account *may* get 
reused;  chances are it'll be months before it does, and the spammers 
will have rotated through hundreds or thousands of others - both 
phish-cracked and those set up just to send their junk.  Blacklisting a 
sender is reduced to blocking the persistent friend-of-a-friend who 
refuses to remove you from the endless stream of chain-forwards, and 
legitimate-but-totally-clueless mailing list operators who can't figure 
out how to unsubscribe you from their list.  :(


2)  You noted originally that these appear to be fully legitimate 
freemail accounts, legitimately used in the past to correspond with your 
customers/clients, that have been compromised and then used to send 
spam.  How do you propose to still allow the legitimate account holders 
to email your clients if you blacklist the sender?



The question then comes down to marking the message as spam and dealing
with it however you normally deal with spam. You'll probably need custom
rule(s) to handle that. You say the message bodies are quite variable,
but I notice that the Reply-to: header doesn't remotely match the From:
header. Is this a common factor?



The ones that I have seen the reply-to doesn't match the from and I
think the reply-to have all been something.jp


If it is, and the body texts have no common features that could also be
used, the only obvious approach would be a rule for each forged sending
domain that fires if the sending domain doesn't match the Reply-to
domain. 



There isn't anything in common that I can see that wouldn't be
susceptible to false positives.  One even left the clients signature
intact.  I've written fairly simple custom rules before but I'm not sure
how to do conditional rules.  I'll have to dig into the docs a little
more.


Martin's suggestion followup should point you in the right direction. 
Sets of phrase rules (how similar are these messages?  do you have ten 
or fifteen you can compare sentence-by-sentence?) with low scores will 
likely help some too.  Meta rules that bump the score up depending on 
how many phrases hit, or phrase+mismatched-sender/reply also work 
tolerably well on this class of spam... if you can get enough samples to 
build a complete enough set of phrase rules.


You'll have to decide how to balance aggressiveness on the content vs 
still allowing legitimate messages through.


Feeding these to Bayes should also help some.

-kgd


Re: Bogus mails from hijacked accounts

2010-03-10 Thread David B Funk
On Wed, 10 Mar 2010, Dennis B. Hopp wrote:

 We seem to be having a problem where clients that we interact with
 regularly are having their hotmail/gmail/yahoo accounts hijacked.  We
 are receiving e-mails from their accounts that legitimately go through
 the correct servers (hotmail,yahoo, etc.) and so they get passed through
 our spam filters.  The messages have different bodies but basically say
 the same thing that they were on vacation and had all their money stolen
 so they need to have money wire transferred to them.

 Obviously we just have to tell the clients that they need to deal with
 the various e-mail providers, but is there an effective way that I can
 filter these messages out before my users see them without blacklisting
 the address?  In one case I had probably 15 users that received the same
 message and naturally they freaked out.

 I have put a sample at:

 http://pastebin.com/9BDXrxmm

 Note I did change the real e-mail address in this message but the
 hotmail address used is valid just masked.

Look at that X-Originating-IP: [41.155.87.236] header, its a dial-up
pool in Lagos Nigeria.

It may seem stereotyped, but it's amazing the percentage of this kind
of spam that -does- come out of that part of the world.

Does anybody have an SA plugin that will grab those X-Originating-IP
headers and throw the address at an RBL? Points for hits by CBL
or a ip-geolocation table for Central Africa.

-- 
Dave Funk  University of Iowa
dbfunk (at) engineering.uiowa.eduCollege of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include std_disclaimer.h
Better is not better, 'standard' is better. B{