Re: Better phish detection

2012-03-18 Thread Dave Warren

On 3/18/2012 8:16 PM, sporkman wrote:

Joseph Brennan wrote:

Imagine one of your users sending mail to a list that another of your
users subscribes to.

I can't quite see the case there.  My rule specifically matches a mismatch
between the envelope-from and From: only when the From: purports to be one
our staff/role accounts.  I had it in testing for the last few days with a
low score and it's doing pretty well.


Well consider your email (the one to which I'm replying):

Return-path:
From: sporkman


That would be a FROM header that mentions one of your staff accounts 
(assuming you're using such a qualifying account now. If not, use a bit 
of imagination) with a completely different MAIL command.


--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren




Re: Better phish detection

2012-03-18 Thread sporkman



Joseph Brennan wrote:
> 
> 
> 
> --On Thursday, March 15, 2012 19:21 -0700 sporkman  wrote:
> 
>> -envelope-from is not from our domain, From: line in the message is,
>> being
>> able to clobber that pattern would be quite helpful by itself.
> 
> 
> Imagine one of your users sending mail to a list that another of your
> users subscribes to.
> 

I can't quite see the case there.  My rule specifically matches a mismatch
between the envelope-from and From: only when the From: purports to be one
our staff/role accounts.  I had it in testing for the last few days with a
low score and it's doing pretty well.

Always open to more ideas though...

Charles
-- 
View this message in context: 
http://old.nabble.com/Better-phish-detection-tp33478328p33529003.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Better phish detection

2012-03-16 Thread Dave Warren

On 3/16/2012 1:11 PM, Joseph Brennan wrote:
--On Thursday, March 15, 2012 19:21 -0700 sporkman  
wrote:


-envelope-from is not from our domain, From: line in the message is, 
being

able to clobber that pattern would be quite helpful by itself.


Imagine one of your users sending mail to a list that another of your
users subscribes to.


This can largely be negated by skipping this test if there are any 
typical List-headers (List-ID, List-Unsubscribe, Mailing-List, etc)




Re: Better phish detection

2012-03-16 Thread Joseph Brennan


sporkman  wrote:


-I'm not going to go into details, but the messages quite often have a
from or envelope-from that we simply don't use when sending email to
customers or replying to them.  In fact, all of these samples have that
wrong.



Just reject that.  No chance of false positives.  No META needed.

Joseph Brennan
Lead Email Systems Engineer
Columbia University Information Technology



Re: Better phish detection

2012-03-16 Thread Joseph Brennan



--On Thursday, March 15, 2012 19:21 -0700 sporkman  wrote:


-envelope-from is not from our domain, From: line in the message is, being
able to clobber that pattern would be quite helpful by itself.



Imagine one of your users sending mail to a list that another of your
users subscribes to.

Joseph Brennan
Lead Email Systems Engineer
Columbia University Information Technology



Re: Better phish detection

2012-03-16 Thread sporkman



Ned Slider wrote:
> 
> On 16/03/12 02:21, sporkman wrote:
>>
>>
>>
>> Ned Slider wrote:
>>>
>>> On 12/03/12 17:02, David B Funk wrote:
 On Mon, 12 Mar 2012, Paul Russell wrote:

> On 3/10/2012 16:43, Ned Slider wrote:
>>
>> This one is easy enough - if the latter is the only valid url that
>> should ever appear in an email, create a meta rule that looks for a
>> url containing bway.net (or even just bway or webmail or login etc),
>> but isn't https://webmail.bway.net/.
>>
>> Create meta rules for the common words you have identified. Link
>> these with a rule such as __HAS_ANY_URI or some of your webmail based
>> URI rules above.
>>
>> What other rules commonly hit - are they sent from freemail accounts?
>> Do they hit any DNSBL's?
>
> It's not that simple. If it were, the problem would not have been
> ongoing for at least 4 years.

 Technically what Ned said is correct "This one is easy enough".
 Yes THIS ONE (emphasis mine) is easy enough, but for some of us these
 kind of spear-phishing attacks are an ever mutating problem and some
 are damned clever.

>>>
>>> Exactly, if you only provide one snippet of an example you don't give us
>>> much to work with so the best we can do is suggest a rule that will
>>> catch that one very narrow example :-/
>>>
>>> Give us a tarball of (preferably unredacted) examples to work with - you
>>> must have hundreds collected over the last 4 years.
>>>
>>>
>>
>> Here's a collection from our support folks:
>>
>> http://home.bway.net/spork/phish/
>>
>> Some patterns of interest (including some of the excellent suggestions
>> upthread):
>>
>> -envelope-from is not from our domain, From: line in the message is,
>> being
>> able to clobber that pattern would be quite helpful by itself.
>> -I'm not going to go into details, but the messages quite often have a
>> from
>> or envelope-from that we simply don't use when sending email to customers
>> or
>> replying to them.  In fact, all of these samples have that wrong.
>> -Most the messages contain a URL that includes our domain in it after the
>> host part of the URL.  The ones that don't still include "bway" somewhere
>> in
>> the URL.
>>
>> If I could slap together a rule that detects those three anomalies
>> together,
>> I'd be pretty happy.
> 
> Good - you have something to work with now.
> 
> Here's a rule that will catch bway.net after the host part of the URL:
> 
> uri   LOCAL_URI_BWAY_NET  m{https?://[^/]+/.{0,40}bway\.net}
> describe  LOCAL_URI_BWAY_NET  URL contains bway.net in the path
> score LOCAL_URI_BWAY_NET  1
> 
> And many of your examples link to bway.htm so lets catch those too:
> 
> uri   LOCAL_URI_BWAY_HTM  m{bway\.html?$}
> describe  LOCAL_URI_BWAY_HTM  Contains link to bway.htm
> score LOCAL_URI_BWAY_HTM  1
> 
> Then I'd create some rules to make meta rules from. For example, not 
> from our domain + has URI + URI contains "bway".
> 
> Generally, the more rules you can create the better. Lots of small 
> scoring rules will invariably outperform a few high scoring rules unless 
> you are able to identify that one killer feature that identifies it as a 
> phish to you.
> 

It's probably been at least a few years since I made any custom rules, so
I'm a bit rusty, but here's a few things I'm trying out with a low score to
see how they work.

This one compares the envelope from to "From:" and if they don't agree,
there's a match:

header __ENV_FROM_TEST EnvelopeFrom !~ /\@bway.net/i
header __FROM_TEST From =~
/support|webmail|helpdesk|tech|info|sales|antispam\@bway.net/i
meta BWAY_PHISH_FROM (__ENV_FROM_TEST && __FROM_TEST)
describe BWAY_PHISH_FROM Mismatched From: and envelope-from
score BWAY_PHISH_MISMATCH_FROM 1.0

This one looks for our hostname in the URI, and if it's not there, but some
variation of our domain shows up in the rest of the URI, it matches:

uri_detail BWAY_PHISH_LINKS domain !~
/bway.net|www.bway.net|webmail.bway.net/ raw =~
/bway.htm|bway.html|webmail.bway.net/
describe BWAY_PHISH_LINKS Strange links that pretend to be webmail
score BWAY_PHISH_LINKS 1.0

I'm also toying with the idea of some meta rules that takes each of those
and also does a body check for the most common words (ie: "account",
"update", "deactivated", etc.) and bumps the score up further.

I'd never seen "uri_detail" before, but it seems pretty handy:

http://spamassassin.apache.org/full/3.3.x/doc/Mail_SpamAssassin_Plugin_URIDetail.html
-- 
View this message in context: 
http://old.nabble.com/Better-phish-detection-tp33478328p33516999.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



RE: Better phish detection

2012-03-16 Thread Aaron Bennett
-Original Message-
From: David F. Skoll [mailto:d...@roaringpenguin.com] 
Sent: Monday, March 12, 2012 12:49 PM
To: users@spamassassin.apache.org
Subject: Re: Better phish detection

Hi,

I've been following this thread... not sure how many of you are aware of this 
project:

http://code.google.com/p/anti-phishing-email-reply/

We use the phishing address list and it does catch a few things.  We don't yet 
use the phishing URL list, but it looks like it might help.

Naturally, this list is reactive, but if enough people used it and contributed 
to it, the results might be pretty good.

Regards,

David.
---

We use it here; I've got a little python script that parses out recent entries 
from that project and builds a simple postfix static map to block mail attempts 
to them.  I'm happy to share if anyone's interested.

- Aaron Bennett

Manager, Systems Administration
Clark University ITS



Re: Better phish detection

2012-03-16 Thread Ned Slider

On 16/03/12 02:21, sporkman wrote:




Ned Slider wrote:


On 12/03/12 17:02, David B Funk wrote:

On Mon, 12 Mar 2012, Paul Russell wrote:


On 3/10/2012 16:43, Ned Slider wrote:


This one is easy enough - if the latter is the only valid url that
should ever appear in an email, create a meta rule that looks for a
url containing bway.net (or even just bway or webmail or login etc),
but isn't https://webmail.bway.net/.

Create meta rules for the common words you have identified. Link
these with a rule such as __HAS_ANY_URI or some of your webmail based
URI rules above.

What other rules commonly hit - are they sent from freemail accounts?
Do they hit any DNSBL's?


It's not that simple. If it were, the problem would not have been
ongoing for at least 4 years.


Technically what Ned said is correct "This one is easy enough".
Yes THIS ONE (emphasis mine) is easy enough, but for some of us these
kind of spear-phishing attacks are an ever mutating problem and some
are damned clever.



Exactly, if you only provide one snippet of an example you don't give us
much to work with so the best we can do is suggest a rule that will
catch that one very narrow example :-/

Give us a tarball of (preferably unredacted) examples to work with - you
must have hundreds collected over the last 4 years.




Here's a collection from our support folks:

http://home.bway.net/spork/phish/

Some patterns of interest (including some of the excellent suggestions
upthread):

-envelope-from is not from our domain, From: line in the message is, being
able to clobber that pattern would be quite helpful by itself.
-I'm not going to go into details, but the messages quite often have a from
or envelope-from that we simply don't use when sending email to customers or
replying to them.  In fact, all of these samples have that wrong.
-Most the messages contain a URL that includes our domain in it after the
host part of the URL.  The ones that don't still include "bway" somewhere in
the URL.

If I could slap together a rule that detects those three anomalies together,
I'd be pretty happy.


Good - you have something to work with now.

Here's a rule that will catch bway.net after the host part of the URL:

uri LOCAL_URI_BWAY_NET  m{https?://[^/]+/.{0,40}bway\.net}
describeLOCAL_URI_BWAY_NET  URL contains bway.net in the path
score   LOCAL_URI_BWAY_NET  1

And many of your examples link to bway.htm so lets catch those too:

uri LOCAL_URI_BWAY_HTM  m{bway\.html?$}
describeLOCAL_URI_BWAY_HTM  Contains link to bway.htm
score   LOCAL_URI_BWAY_HTM  1

Then I'd create some rules to make meta rules from. For example, not 
from our domain + has URI + URI contains "bway".


Generally, the more rules you can create the better. Lots of small 
scoring rules will invariably outperform a few high scoring rules unless 
you are able to identify that one killer feature that identifies it as a 
phish to you.







Re: Better phish detection

2012-03-16 Thread Sanesecurity

>Here's a collection from our support folks:
> http://home.bway.net/spork/phish/


Hi,

I've added a few sigs to junk.ndb and phish.ndb which might help a little,
if you are using ClamAV and Third-Party signatures.

Cheers,

Steve
Sanesecurity.co.uk
-- 
View this message in context: 
http://old.nabble.com/Better-phish-detection-tp33478328p33516249.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Better phish detection

2012-03-15 Thread sporkman



Ned Slider wrote:
> 
> On 12/03/12 17:02, David B Funk wrote:
>> On Mon, 12 Mar 2012, Paul Russell wrote:
>>
>>> On 3/10/2012 16:43, Ned Slider wrote:

 This one is easy enough - if the latter is the only valid url that
 should ever appear in an email, create a meta rule that looks for a
 url containing bway.net (or even just bway or webmail or login etc),
 but isn't https://webmail.bway.net/.

 Create meta rules for the common words you have identified. Link
 these with a rule such as __HAS_ANY_URI or some of your webmail based
 URI rules above.

 What other rules commonly hit - are they sent from freemail accounts?
 Do they hit any DNSBL's?
>>>
>>> It's not that simple. If it were, the problem would not have been
>>> ongoing for at least 4 years.
>>
>> Technically what Ned said is correct "This one is easy enough".
>> Yes THIS ONE (emphasis mine) is easy enough, but for some of us these
>> kind of spear-phishing attacks are an ever mutating problem and some
>> are damned clever.
>>
> 
> Exactly, if you only provide one snippet of an example you don't give us 
> much to work with so the best we can do is suggest a rule that will 
> catch that one very narrow example :-/
> 
> Give us a tarball of (preferably unredacted) examples to work with - you 
> must have hundreds collected over the last 4 years.
> 
> 

Here's a collection from our support folks:

http://home.bway.net/spork/phish/

Some patterns of interest (including some of the excellent suggestions
upthread):

-envelope-from is not from our domain, From: line in the message is, being
able to clobber that pattern would be quite helpful by itself.
-I'm not going to go into details, but the messages quite often have a from
or envelope-from that we simply don't use when sending email to customers or
replying to them.  In fact, all of these samples have that wrong.
-Most the messages contain a URL that includes our domain in it after the
host part of the URL.  The ones that don't still include "bway" somewhere in
the URL.

If I could slap together a rule that detects those three anomalies together,
I'd be pretty happy.
-- 
View this message in context: 
http://old.nabble.com/Better-phish-detection-tp33478328p33514647.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Better phish detection

2012-03-13 Thread Ned Slider

On 12/03/12 17:02, David B Funk wrote:

On Mon, 12 Mar 2012, Paul Russell wrote:


On 3/10/2012 16:43, Ned Slider wrote:


This one is easy enough - if the latter is the only valid url that
should ever appear in an email, create a meta rule that looks for a
url containing bway.net (or even just bway or webmail or login etc),
but isn't https://webmail.bway.net/.

Create meta rules for the common words you have identified. Link
these with a rule such as __HAS_ANY_URI or some of your webmail based
URI rules above.

What other rules commonly hit - are they sent from freemail accounts?
Do they hit any DNSBL's?


It's not that simple. If it were, the problem would not have been
ongoing for at least 4 years.


Technically what Ned said is correct "This one is easy enough".
Yes THIS ONE (emphasis mine) is easy enough, but for some of us these
kind of spear-phishing attacks are an ever mutating problem and some
are damned clever.



Exactly, if you only provide one snippet of an example you don't give us 
much to work with so the best we can do is suggest a rule that will 
catch that one very narrow example :-/


Give us a tarball of (preferably unredacted) examples to work with - you 
must have hundreds collected over the last 4 years.




Email addresses in a DNSBL (was Re: Better phish detection)

2012-03-12 Thread David F. Skoll
On Mon, 12 Mar 2012 14:47:41 -0500 (CDT)
David B Funk  wrote:

> This concept was discussed/debated on this list about 2 years ago (~
> Apr 2009; search for the subject of "emailBL"). 
> There was some disagreement about how to handle the '@' within
> the context of a DNS record and about privacy/security issues.

In the case of APER, the entire list is publicly downloadable, so I don't
think making it available via DNS introduces any additional privacy issues.

Handling '@' within a DNS record is a solved problem (see the SOA record).
You just replace it with a '.'

If we were worried about the (extremely unlikely) clash between
"b...@sub.example.org" and "bob@example.org", we could just use the
sha1sum of the lower-cased email address as the DNS lookup key.

Regards,

David.


Re: Better phish detection

2012-03-12 Thread David B Funk

On Mon, 12 Mar 2012, Simon Loewenthal wrote:


Paul Russell  wrote:


The list was originally started by a group of email administrators in
higher education who
were attempting to deal with an epidemic of compromised accounts that
were being exploited
to send password phishing spam, mostly to addresses at other colleges
and universities. At
that point in time, it was easier to filter by sender address or
reply-to address than
content. Over time, the phishers seem to have expanded the target
demographic to include
everyone everywhere.


The list could be accessed by DNS and used as an rbl.


This concept was discussed/debated on this list about 2 years ago (~ Apr 
2009; search for the subject of "emailBL"). 
There was some disagreement about how to handle the '@' within

the context of a DNS record and about privacy/security issues.


--
Dave Funk  University of Iowa
College of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include 
Better is not better, 'standard' is better. B{


Re: Better phish detection

2012-03-12 Thread Simon Loewenthal
Paul Russell  wrote:

>On 3/12/2012 12:58, Simon Loewenthal wrote:
>> 
>>  At first glance:
>> This is private black list of email assesses maintened by many.  Free
>to use, but it'll turn into a huge file for a server to parse.
>> 
>>  Eventually we moved from hosts files to DNS :)
>> 
>>  I should rather block content not email addresses. 
>
>The list was originally started by a group of email administrators in
>higher education who 
>were attempting to deal with an epidemic of compromised accounts that
>were being exploited 
>to send password phishing spam, mostly to addresses at other colleges
>and universities. At 
>that point in time, it was easier to filter by sender address or
>reply-to address than 
>content. Over time, the phishers seem to have expanded the target
>demographic to include 
>everyone everywhere.

The list could be accessed by DNS and used as an rbl. 
--
Dogs are tough. 
I've been interrogating this one for hours and he still won't tell me who's a 
good boy. 
  simon@klunky / .co.uk / .org


Re: Better phish detection

2012-03-12 Thread David F. Skoll
I have some statistics about the Anti-Phishing Email Reply project.

Our quarantine currently has 1,906,179 messages of which 4022 were caught
because of addresses on APER.  All 4022 look like spam or phishing attempts.
So even though APER caught only about 0.21% of our quarantined messages,
the ones it did catch are potentially very nasty.

(And of the 4022 on APER, 221 of them would have scored below the spam
threshold were it not for APER.)

Regards,

David.


Re: Better phish detection

2012-03-12 Thread Paul Russell

On 3/12/2012 12:58, Simon Loewenthal wrote:


 At first glance:
This is private black list of email assesses maintened by many.  Free to use, 
but it'll turn into a huge file for a server to parse.

 Eventually we moved from hosts files to DNS :)

 I should rather block content not email addresses. 


The list was originally started by a group of email administrators in higher education who 
were attempting to deal with an epidemic of compromised accounts that were being exploited 
to send password phishing spam, mostly to addresses at other colleges and universities. At 
that point in time, it was easier to filter by sender address or reply-to address than 
content. Over time, the phishers seem to have expanded the target demographic to include 
everyone everywhere.


--
Paul Russell, Senior Systems Administrator
OIT Messaging Services Team
University of Notre Dame



Re: Better phish detection

2012-03-12 Thread David F. Skoll
On Mon, 12 Mar 2012 13:05:24 -0400
Paul Russell  wrote:

> Most of the phishing spam we see seems to come from
> apparently-compromised accounts, so we seldom see the same sender
> address for more than a few hours, or a few days, at most.

Right... the list is reactive.  I find it usually takes anywhere from an
hour to a few hours for a compromised address to get on the list, so there
is some value if the address is used for more than a few hours.

Also, there's a lot of value in finding out that one of *your* users has
been compromised. :)  I see a couple of nd.edu addresses in the list,
though the last-seen dates are old (Aug and October 2011.)

> Phishing reply-to addresses and phishing URL's change less frequently.

> There are several variants of phishing message text, and new variants
> are introduced from time to time, but the message body seems to be
> the most reliable source of filter fodder.

I agree.  The APER project is just one more tool in the toolbox.

Regards,

David.


Re: Better phish detection

2012-03-12 Thread Paul Russell

On 3/12/2012 12:49, David F. Skoll wrote:

Hi,

I've been following this thread... not sure how many of you are aware of
this project:

http://code.google.com/p/anti-phishing-email-reply/

We use the phishing address list and it does catch a few things.  We
don't yet use the phishing URL list, but it looks like it might help.

Naturally, this list is reactive, but if enough people used it and
contributed to it, the results might be pretty good.

Regards,

David.



Most of the phishing spam we see seems to come from apparently-compromised accounts, so we 
seldom see the same sender address for more than a few hours, or a few days, at most.


Phishing reply-to addresses and phishing URL's change less frequently.

There are several variants of phishing message text, and new variants are introduced from 
time to time, but the message body seems to be the most reliable source of filter fodder.


YMMV, of course.

--
Paul Russell, Senior Systems Administrator
OIT Messaging Services Team
University of Notre Dame


Re: Better phish detection

2012-03-12 Thread David F. Skoll
On Mon, 12 Mar 2012 17:58:22 +0100
Simon Loewenthal  wrote:

>  At first glance:
> This is private black list of email assesses maintened by many.  Free
> to use, but it'll turn into a huge file for a server to parse.

Well yes, if you aren't smart about how you use it. :)

We use it by throwing away any entries older than 6 months and putting
the rest in a database.  We happen to use PostgreSQL, but you could
also use something like Berkeley DB.  Then lookups are fast.

>  I should rather block content not email addresses.

I think an email address *known* to have been compromised is a fine thing
to block, especially if you block mail going *to* that address.

The list of phishing URLs is potentially very useful too, but as I said, we
haven't started using those yet.

Regards,

David.


Re: Better phish detection

2012-03-12 Thread David B Funk

On Mon, 12 Mar 2012, Paul Russell wrote:


On 3/10/2012 16:43, Ned Slider wrote:


This one is easy enough - if the latter is the only valid url that should 
ever appear in an email, create a meta rule that looks for a url containing 
bway.net (or even just bway or webmail or login etc), but isn't 
https://webmail.bway.net/.


Create meta rules for the common words you have identified. Link these with 
a rule such as __HAS_ANY_URI or some of your webmail based URI rules above.


What other rules commonly hit - are they sent from freemail accounts? Do 
they hit any DNSBL's?


It's not that simple. If it were, the problem would not have been ongoing for 
at least 4 years.


Technically what Ned said is correct "This one is easy enough".
Yes THIS ONE (emphasis mine) is easy enough, but for some of us these
kind of spear-phishing attacks are an ever mutating problem and some
are damned clever.

Even the not too clever ones are problematic if they're good enough
to fool the victims (which sadly doesn't take too much ).
We have to control it in the mail stream as we cannot control how
our clients read their mail.


--
Dave Funk  University of Iowa
College of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include 
Better is not better, 'standard' is better. B{


Re: Better phish detection

2012-03-12 Thread Simon Loewenthal
"David F. Skoll"  wrote:

>Hi,
>
>I've been following this thread... not sure how many of you are aware
>of
>this project:
>
>http://code.google.com/p/anti-phishing-email-reply/
>
>We use the phishing address list and it does catch a few things.  We
>don't yet use the phishing URL list, but it looks like it might help.
>
>Naturally, this list is reactive, but if enough people used it and
>contributed to it, the results might be pretty good.
>
>Regards,
>
>David.

 At first glance:
This is private black list of email assesses maintened by many.  Free to use, 
but it'll turn into a huge file for a server to parse.

 Eventually we moved from hosts files to DNS :)

 I should rather block content not email addresses. 


Re: Better phish detection

2012-03-12 Thread Axb

On 03/12/2012 05:45 PM, Paul Russell wrote:

On 3/10/2012 16:43, Ned Slider wrote:


This one is easy enough - if the latter is the only valid url that
should ever appear in an email, create a meta rule that looks for a
url containing bway.net (or even just bway or webmail or login etc),
but isn't https://webmail.bway.net/.

Create meta rules for the common words you have identified. Link these
with a rule such as __HAS_ANY_URI or some of your webmail based URI
rules above.

 >

What other rules commonly hit - are they sent from freemail accounts?
Do they hit any DNSBL's?


It's not that simple. If it were, the problem would not have been
ongoing for at least 4 years.



If I could get enough samples together, I'd be willing to run an auto 
rule creation routine and make them available somewhere.


If anybody can contribute please contact me off list

Axb



Re: Better phish detection

2012-03-12 Thread David F. Skoll
Hi,

I've been following this thread... not sure how many of you are aware of
this project:

http://code.google.com/p/anti-phishing-email-reply/

We use the phishing address list and it does catch a few things.  We
don't yet use the phishing URL list, but it looks like it might help.

Naturally, this list is reactive, but if enough people used it and
contributed to it, the results might be pretty good.

Regards,

David.


Re: Better phish detection

2012-03-12 Thread Paul Russell

On 3/10/2012 16:43, Ned Slider wrote:


This one is easy enough - if the latter is the only valid url that 
should ever appear in an email, create a meta rule that looks for a url 
containing bway.net (or even just bway or webmail or login etc), but 
isn't https://webmail.bway.net/.


Create meta rules for the common words you have identified. Link these 
with a rule such as __HAS_ANY_URI or some of your webmail based URI 
rules above.

>
What other rules commonly hit - are they sent from freemail accounts? Do 
they hit any DNSBL's?


It's not that simple. If it were, the problem would not have been ongoing for at least 4 
years.


--
Paul Russell, Senior Systems Administrator
OIT Messaging Services Team
University of Notre Dame


Re: Automatic rule generation Re: Better phish detection

2012-03-11 Thread John Hardin

On Sun, 11 Mar 2012, dar...@chaosreigns.com wrote:


The software used to generate the sought rules, or perhaps an old version
of it, is in the spamassassin source tree.  You can feed it a folder of
known non-spams, and a folder of known spams, and it'll auto-generate rules
that hit the spams but not the non-spams.


I've been collecting phish spams for quite a while looking to do something 
for phishing similar to the ADVANCE_FEE GA-evolved rules, I've just never 
gotten the round tuits.


If you do start doing sought_phish I'd be more than happy to contribute my 
corpus and continue to keep it fresh.


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  Failure to plan ahead on someone else's part does not constitute
  an emergency on my part. -- David W. Barts in a.s.r
---
 Today: Daylight Saving Time begins in U.S. - Spring Forward


Re: Better phish detection

2012-03-11 Thread hamann . w


Dave Funk wrote:

>> 
>> As an admin on a site that regularly gets hit with phish attacks, I can 
>> answer that. The forms are most often a web-page, which are:
>> 
>> 1) forms hosted on Google-Docs or legit servey sites.[0]
>> 2) sites hidden behind URL-shorteners
would you want to submit details to a site with a redirected url?
Probably SA is not the right tool here, because it would have to mark detected 
mail as "caution"

>> 3) forms hidden in pages hosted on compromised legit sites.[1]
>> 4) forms attached to mail messages, the attachments obfuscated by being
>> MIME-typed as application/octet-stream but the file names ending in 
>> ".htm"
>> so SA won't try looking inside but mail-clients -will- automagically
>> "just do the right thing"(tm) [2]
sounds like a potential improvement on any filter: try to identify attachments 
by their first 512
bytes rather than by filename or mime type

>> 5) URIs that are obfuscated by being buried inside javascript that
>> dynamically generates them at message open time.[3]
If there was a "caution" rather than just "potential spam" mark, it should 
certainly mark
javascript

>> [3] Damn people who insist that HTML should be acceptable everwhere.
>>  I tried creating rules that blacklist email containing javascript
>>  but there's legit sites (purchase confirmations, reservation notices,
>>  etc) that insist on doing that crap.
>> 

My own way of life:
a) messages that do not list me in either To or Cc (that is most mailing lists) 
must come from
whitelisted senders, otherwise they do not even make it to SA
b) I read mails on a text interface with a nice "read this one message in 
browser" pushbutton
c) the actual sending email address should not be completely obscured in the 
mail reader,
in favor of a display name

I have implemented b) at the company where I work. For more than 50 % of mails 
handled by average
staff, the same pushbutton means "open in application".
When this project started a decade ago, I could not find a way to associate 
that particular class of mails
(identified by sender, subject line, and mime-type) with an application in 
either Netscape or
Outlook. So the incentive is: have better workflow for the majority of 
messages, in exchange for
a need to hit "view in browser" for some messages



Automatic rule generation Re: Better phish detection

2012-03-10 Thread darxus
The software used to generate the sought rules, or perhaps an old version
of it, is in the spamassassin source tree.  You can feed it a folder of
known non-spams, and a folder of known spams, and it'll auto-generate rules
that hit the spams but not the non-spams.  

Ah, I documented it some here:
https://wiki.apache.org/spamassassin/WritingRules

svn checkout http://svn.apache.org/repos/asf/spamassassin/trunk
cd trunk/masses/rule-dev
./seek-phrases-in-corpus ham:dir:~/Maildir/ 
spam:dir:~/Maildir/.bad.spam-missed/ 

On 03/10, sporkman wrote:
> 
> Hello,
> 
> We are getting a fair amount of very targetted phish attempts to our
> userbase.  Since we are relatively small, I don't think any of the URIBLs
> really help (or phishtank or other lists) since we're not a large bank or
> paypal or anything like that.
> 
> I did see some gentleman make a rather valiant attempt at listing all the
> common phrases here:
> 
> http://old.nabble.com/introducing-body-J_MAILBOX_FULL-tc33207944.html#a33213220
> 
> It has a number of errors, and obviously that's not very efficient (I suck
> at regexs, but I know enough to know that list can be collapsed).
> 
> Any pointers to a good starting point to take a list like that and make it
> usable?  The phrasing on these is always very similar - stuff about
> upgrading your webmail account, etc.
> 
> We're running qmail/vpopmail, and our upgrade to postfix to at least
> front-end qmail is still a ways off.  I think with postfix we could probably
> catch a bunch of this garbage at the front door.  So for now, our only real
> tool to fight this is SA.  
> 
> I assume we're not the only ones seeing this mess, what are others doing to
> counteract this?
> 
> Thanks,
> 
> Charles
> -- 
> View this message in context: 
> http://old.nabble.com/Better-phish-detection-tp33478328p33478328.html
> Sent from the SpamAssassin - Users mailing list archive at Nabble.com.
> 

-- 
"If you are not paranoid... you may not be paying attention."
 - j...@creative-net.net, on an IDPA mailing list
http://www.ChaosReigns.com


Re: Better phish detection

2012-03-10 Thread Ned Slider

On 10/03/12 20:27, sporkman wrote:




Generally it is easier to offer suggestions if examples are provided (on 
pastebin)




Here's the latest example:

http://broomesol.com/upgrade.webmail.bway.net/main_login.htm

Compare to our actual webmail login:

https://webmail.bway.net/



This one is easy enough - if the latter is the only valid url that 
should ever appear in an email, create a meta rule that looks for a url 
containing bway.net (or even just bway or webmail or login etc), but 
isn't https://webmail.bway.net/.


Create meta rules for the common words you have identified. Link these 
with a rule such as __HAS_ANY_URI or some of your webmail based URI 
rules above.


What other rules commonly hit - are they sent from freemail accounts? Do 
they hit any DNSBL's?




Thanks,

Charles



Re: Better phish detection

2012-03-10 Thread hamann . w


Hi,

the replica seems to be down
Things that could be promising:
a) the form target seems to be similar to your site name
b) it is probably possible to detect similarity between your image and the 
replica

I guess that the presence of upgrade or webmail and a form url with bway inside 
might work
as a filter.

Regards
Wolfgang



Re: Better phish detection

2012-03-10 Thread Dave Funk

On Sat, 10 Mar 2012, haman...@t-online.de wrote:


Hello,

We are getting a fair amount of very targetted phish attempts to our
userbase.  Since we are relatively small, I don't think any of the URIBLs
really help (or phishtank or other lists) since we're not a large bank or
paypal or anything like that.

I did see some gentleman make a rather valiant attempt at listing all the
common phrases here:


Hi,

I would not feel inclined to update a filter every day  so the question is: 
what do
these things have in common?
It seems somebody wants your users to complete a form  where would the form 
be sent to?
A valid domain, or just some ip address

Regards
Wolfgang


As an admin on a site that regularly gets hit with phish attacks, I can 
answer that. The forms are most often a web-page, which are:


1) forms hosted on Google-Docs or legit servey sites.[0]
2) sites hidden behind URL-shorteners
3) forms hidden in pages hosted on compromised legit sites.[1]
4) forms attached to mail messages, the attachments obfuscated by being
   MIME-typed as application/octet-stream but the file names ending in ".htm"
   so SA won't try looking inside but mail-clients -will- automagically
   "just do the right thing"(tm) [2]
5) URIs that are obfuscated by being buried inside javascript that
   dynamically generates them at message open time.[3]

I've got a number of invisible __rules that look for things such as URIs
that have the text "form" anywhere in it etc, look for various key words 
("quota","passord","account", etc) and then a bunch of metas that tie them

together; but it's a never ending battle. ;(

[0] Have to regularly scan my spamtraps, look for such crap and then go
click the "report abuse" link.

[1] I wish I could dope-slap all the people who think they can set up a
WordPress site and just let it run with out ever updating/monitoring 
it.


[2] How do you fight attacks that SA isn't even willing to try to look at?
Hey SA devs, can I make an enhancement request. I tried creating a
rule that looked for that sort of crap but there's legit mail that
does it too.

[3] Damn people who insist that HTML should be acceptable everwhere.
I tried creating rules that blacklist email containing javascript
but there's legit sites (purchase confirmations, reservation notices,
etc) that insist on doing that crap.

--
Dave Funk  University of Iowa
College of Engineering
319/335-5751   FAX: 319/384-0549   1256 Seamans Center
Sys_admin/Postmaster/cell_adminIowa City, IA 52242-1527
#include 
Better is not better, 'standard' is better. B{


Re: Better phish detection

2012-03-10 Thread sporkman


hamann.w wrote:
> 
>>> 
>>> 
>>> Hello,
>>> 
>>> We are getting a fair amount of very targetted phish attempts to our
>>> userbase.  Since we are relatively small, I don't think any of the
>>> URIBLs
>>> really help (or phishtank or other lists) since we're not a large bank
>>> or
>>> paypal or anything like that.
>>> 
>>> I did see some gentleman make a rather valiant attempt at listing all
>>> the
>>> common phrases here:
>>> 
> 
> 
> Hi,
> 
> I would not feel inclined to update a filter every day  so the
> question is: what do
> these things have in common?
> 

The message is always short, always mentions "webmail", "upgrade", "update",
"your information" and then a link to an offsite URL.  The list of words in
the linked ruleset is pretty much on target for the type of phrases they
include.

Older variations did not link to a form, but instead simply asked the user
to reply with their email and password (which, sadly always worked on a few
of our users).



hamann.w wrote:
> 
> It seems somebody wants your users to complete a form  where would the
> form be sent to?
> A valid domain, or just some ip address
> 

Usually a valid, legitimate domain.  Obviously a hacked site where they have
installed a form that collects the login info.  They used to hotlink our css
and images until I started serving up a "different" version.  Now they host
the images and css with the form.

Here's the latest example:

http://broomesol.com/upgrade.webmail.bway.net/main_login.htm

Compare to our actual webmail login:

https://webmail.bway.net/

Thanks,

Charles 

hamann.w wrote:
> 
> 
> Regards
> Wolfgang
> 
> a fellow qmail user :)
> 
> 

-- 
View this message in context: 
http://old.nabble.com/Better-phish-detection-tp33478328p33478504.html
Sent from the SpamAssassin - Users mailing list archive at Nabble.com.



Re: Better phish detection

2012-03-10 Thread hamann . w
>> 
>> 
>> Hello,
>> 
>> We are getting a fair amount of very targetted phish attempts to our
>> userbase.  Since we are relatively small, I don't think any of the URIBLs
>> really help (or phishtank or other lists) since we're not a large bank or
>> paypal or anything like that.
>> 
>> I did see some gentleman make a rather valiant attempt at listing all the
>> common phrases here:
>> 


Hi,

I would not feel inclined to update a filter every day  so the question is: 
what do
these things have in common?
It seems somebody wants your users to complete a form  where would the form 
be sent to?
A valid domain, or just some ip address

Regards
Wolfgang

a fellow qmail user :)