RE: New bitcoin ransom message today

2019-12-19 Thread Chip M.
datamining, so will look at that in more detail. I've been scoring "storage.googleapis", however it's used by a lot of non-security-competent Hammers, so it's difficult to give it more than a small score. IMO it would be worthwhile to score it at least a wee bit in case that would help anybody convince their PHB that it's a Bad Practice. John, perhaps a meta for style issues, AWS, and googleapis? - "Chip"

RE: New bitcoin ransom message today

2018-12-13 Thread Chip M.
:roll-eyes: John Hardin: I'll ask for a full bundle from this volunteer (he's in your time zone), and send you full spamples of everything relevant. - "Chip"

Re: 9D character used in words to avoid detection

2018-11-18 Thread Chip M.
t hit SA's "OBFU_BITCOIN" and my own anti-bitcoin/sextortion & hi-Ascii-count tests. The question is, is that broken header pattern in the original, and if so, should it be detected & scored, in-and-of-itself? We'd need the most pristine original, before proceding.

spample: porn extortion with pure numeric From domain and base64 body

2018-07-17 Thread Chip M.
> "Pablo Hess" <692@442.947> "Elba Olsen" <255@434.964> "Millie Weber" <041@253.975> We're killing 100% of these (post plain-vanilla SA), mainly due to IP Nation tests, lots of custom body phrase tests, and some body &qu

SPF PermError (was: "Re: Scans and Invoice spam containg HREF to something bad")

2018-06-27 Thread Chip M.
ccepted way to contact those companies? Maybe their Postmaster? Probably a lost cause, but it's frustrating seeing Broke Stuff. :( - "Chip"

Re: Shortcircuit reports only 1 test

2018-01-28 Thread Chip
01/28/2018 04:52 PM, David Jones wrote: > On 01/28/2018 02:25 PM, Benny Pedersen wrote: >> Chip skrev den 2018-01-28 21:01: >>> I see that makes sense.  Thanks for the clarity. >>> >>> However how do you get to 150? >>> >>> good DKIM = 100

Shortcircuit reports only 1 test

2018-01-28 Thread Chip
headers does SpamAssassin cross-reference to ascertain if it's part of the whitelist? I'm sure my explanation is revealing some ignorance - don't hesitate to educate me. Thanks. On 01/28/2018 04:52 PM, David Jones wrote: > On 01/28/2018 02:25 PM, Benny Pedersen wrote: >>

Re: Shortcircuit reports only 1 test

2018-01-28 Thread Chip
gt; On 01/28/2018 02:09 PM, David Jones wrote: >> On 01/28/2018 02:01 PM, Chip wrote: >>> I see that makes sense.  Thanks for the clarity. >>> >>> However how do you get to 150? >>> >>> good DKIM = 100 >>> good SPF = 100 >>> >&

Re: Shortcircuit reports only 1 test

2018-01-28 Thread Chip
I see that makes sense.  Thanks for the clarity. However how do you get to 150? good DKIM = 100 good SPF = 100 That totals 200 On 01/28/2018 02:53 PM, David Jones wrote: > On 01/28/2018 12:36 PM, Chip wrote: >> I have the following in local.cf >> >> shortcir

Shortcircuit reports only 1 test

2018-01-28 Thread Chip
I have the following in local.cf shortcircuit DKIM_VALID_AU on shortcircuit SPF_PASS on score DKIM_VALID_AU -100 score SPF_PASS -100 The question is are all triggers reported in headers (DKIM and SPF), or just some? A look at the logs and SA headers shows: Logs: 2018-01-28 13:24:05 1efrcb-0001

Re: From name containing a spoofed email address

2018-01-22 Thread Chip
ardin wrote: > On Mon, 22 Jan 2018, Chip wrote: > >> Understood, so then what would a From:name that contains a domain look >> like since it seems the filter needs to compare the domain found in >> From:addr to From:name in order to pass it as ham. > >   From: &quo

Re: From name containing a spoofed email address

2018-01-22 Thread Chip
Finally!  Thank you! On 01/22/2018 06:32 PM, John Hardin wrote: > On Mon, 22 Jan 2018, Chip wrote: > >> Understood, so then what would a From:name that contains a domain look >> like since it seems the filter needs to compare the domain found in >> From:addr to From:nam

Re: From name containing a spoofed email address

2018-01-22 Thread Chip
Understood, so then what would a From:name that contains a domain look like since it seems the filter needs to compare the domain found in From:addr to From:name in order to pass it as ham. Or am I on another planet altogether here, just say so and I'll shut up. On 01/22/2018 06:21 PM,

Re: From name containing a spoofed email address

2018-01-22 Thread Chip
compare to the domain part of > From:addr. > > The "bounces.em.secureserver.net" you're referring to is part of the > EnvelopeFrom (AKA ReturnPath).  This particular check doesn't consider > that domain name in any way whatsoever. > > On Mon, 22 Jan 2018, Chip

Re: From name containing a spoofed email address

2018-01-22 Thread Chip
On 01/22/2018 05:56 PM, RW wrote: > On Mon, 22 Jan 2018 17:44:00 -0500 > Chip wrote: > >> Following is the full header with identifiable information >> anonymized. > I don't see what you are getting at, in: > > > From: blablabla > > blablabla doesn't contain an "@". >

Re: From name containing a spoofed email address

2018-01-22 Thread Chip
ail address (as in, it lacks a > valid DKIM and/or doesn't come from a server approved by gmail's SPF > record).  It's just that spoofing isn't a sure-fire way to determine > that something is spam (if only...). > > > > On Mon, 22 Jan 2018, Chip wrote: >

Re: From name containing a spoofed email address

2018-01-22 Thread Chip
So it's my understanding that SA does the following with this rule, which is it is checking the From:addr and From:name values in SA to find their domain and triggering a rule hit if there is a domain in the From:name that doesn't match the domain in the From:addr. However, when I examine the head

Re: From name containing a spoofed email address

2018-01-19 Thread Chip
Okay, trying to understand. You say: whitelist_auth *@*.chase.com whitelist_auth serv...@paypal.com This would trust emails from any subdomain under chase.com and serv...@paypal.com that hit SPF_PASS or DKIM_VALID_AU rules. Okay, got that. But I'm confused when you further expl

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-19 Thread Chip
wants to pipe in (as in *pipe* the email via procmail somewhere where a dkim/spf script can run against it and depending on the result, send it to a certain folder.) On 01/19/2018 10:05 AM, Dianne Skoll wrote: > On Thu, 18 Jan 2018 16:01:13 -0500 > Chip wrote: > >> I'm tied to a

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-19 Thread Chip
of addresses. What is the guess that it will be flooded with spam? That is what we are setting out to ascertain. On 01/19/2018 09:43 AM, David Jones wrote: > On 01/19/2018 08:30 AM, Chip wrote: >> Good question. >> >> Saying why I care about spf and dkim but not spam

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-19 Thread Chip
Thank you!  I see that shortcircuit is already enabled in 320! I think you really hit on something. Thanks again! I knew there was a simple answer. On 01/19/2018 09:35 AM, David Jones wrote: > On 01/19/2018 08:24 AM, Chip wrote: >> Ok point take - I should have mentioned earlier that

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-19 Thread Chip
of a spoofed from email address/domain together with an authentic spf and/or dkim is *less* likely than a spoofed from email address without any spf/dkim.  Collecting statistics, I guess you could say. On 01/19/2018 09:07 AM, RW wrote: > On Thu, 18 Jan 2018 18:49:52 -0500 > Chip wrote: >

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-19 Thread Chip
priority TEST -100 shortcircuit TEST on On 01/19/2018 08:38 AM, David Jones wrote: > On 01/18/2018 05:49 PM, Chip wrote: >> Very well stated.  Bravo! >> >> The end point here is to examine the email headers that specifically >> refer to dkim and spf signatures.  Bas

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
Exactly! That is why I want to stick with SA because it does know how to do spf and dkim checks whereas other systems don't unless we install software to do that.  On 01/18/2018 07:31 PM, Alan Hodgson wrote: > On Thu, 2018-01-18 at 18:49 -0500, Chip wrote: >> Very well stated.  Br

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
for examining emails is attractive. On 01/18/2018 06:24 PM, Alex Woick wrote: > Chip schrieb am 18.01.2018 um 23:43: >> yes I'm starting to see that.  I may need to build a box specifically >> suited for this using procmail.  I had hoped that I could stay with >&g

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
Thanks for pointing out Sieve.  I'll look into that. It's nice in that it acts on the last procedure - or right before delivery to the mail folder after all the other dirty work has been done. thanks. On 01/18/2018 05:55 PM, Larry Rosenman wrote: > On Thu, Jan 18, 2018 at 05:43:04P

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
rking. On 01/18/2018 05:34 PM, Noel wrote: > On 1/18/2018 2:09 PM, Chip wrote: >> Newbie excited to use the features of SpamAssassin for a new project >> that needs to flag inbound email for sorting into folders  (this can be >> done via cpanel-level filtering) based on

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
ser preferences. I would prefer that you do not respond to my inquiries any longer as I consider you to be somewhat of a harasser. Please just exit the virtual door and stay away from my inbox. Thank you. On 01/18/2018 05:20 PM, Reindl Harald wrote: > > > Am 18.01.2018 um 23:17 schrieb

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
: > On 01/18/2018 04:00 PM, Chip wrote: >> Find this tidbit of information how to find the rules that are loaded >> with spam assassin: >> >> spamassassin --lint -D 2>&1 | grep 'config: read file' >> >> I see many, many lines of files. >> &g

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
ad and abandon me and then tell me I'm lost. So if you can't simply offer some honest, good, informative advise then please buzz off. On 01/18/2018 05:07 PM, Reindl Harald wrote: > > > Am 18.01.2018 um 23:00 schrieb Chip: >> Find this tidbit of information how to find th

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
or 0. There must be a simpler solution to turning off rules than individually editing each ruleset. And in the local.cf there are NO rules. So I'm back to zero here. On 01/18/2018 04:08 PM, David Jones wrote: > On 01/18/2018 03:01 PM, Chip wrote: >> Thank you Shanew for the suggestion

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
ut 10 domains. On 01/18/2018 04:08 PM, David Jones wrote: > On 01/18/2018 03:01 PM, Chip wrote: >> Thank you Shanew for the suggestion. >> >> I'm tied to a Cpanel/WHM VPS which can't be changed.  Give that there >> are some restrictions such as the use of Ex

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
ink that you'd be better of using something like > procmail, maildrop (part of Courier), or sieve if want you want is > sorting without all the overhead of checking for spam. > > But maybe I'm not understanding what you want to accomplish... > > On Thu, 18 Jan 2018, Chip wrote:

Re: Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
That sounds doable.  If I score everything 0 or 999 will things be overwritten in local.cf on update or elsewhere? What you are suggesting sounds like a reasonable course of action. On 01/18/2018 03:29 PM, David Jones wrote: > On 01/18/2018 02:09 PM, Chip wrote: >> Newbie excited t

Turn OFF SA spam filtering but keep ON header examination

2018-01-18 Thread Chip
Newbie excited to use the features of SpamAssassin for a new project that needs to flag inbound email for sorting into folders  (this can be done via cpanel-level filtering) based on keywords in headers (header search by SA). This is a Centos 6.9 machine running cpanel/WHM 11.68.0.23 and SpamAssas

Re: spample: Microsoft Office DDE exploit (in OpenXML attachment)

2017-10-31 Thread Chip M.
to see an .ics sample. Has anybody else seen much/any DDE attack variants? - "Chip"

spample: Microsoft Office DDE exploit (in OpenXML attachment)

2017-10-30 Thread Chip M.
s and more diverse ham to run some ham-only MassChecks using the above rules. I'll share the results. Has anyone seen the RTF or Calendar/.ics forms of this exploit? If so, please-please-please post a spample. - "Chip"

Re: new campaign: bitly & appengine.google

2017-09-13 Thread Chip M.
later by a separate app. For example, Splunk logging is often done via UDP, since it's typically viewed by humans, and a few second (or often minutes) delay is not a big issue, and the potential for lost data packets is less relevant than performance. - "Chip"

new campaign: bitly & appengine.google

2017-09-12 Thread Chip M.
677610925:290 Incident:5858851682625:543 The message text is a fake BBB complaint. I'll put a sample online tonight, if practical. The SA scores have ranged from -2.2 to 1.5, with no useful patterns. Does anyone have a contact at BitLy? These would be trivially easy for them to block. - "Chip"

Re: Anyone else just blocking the ".top" TLD?

2017-07-05 Thread Chip M.
ts) buying and using that TLD of their base name. Even otherwise-Giga-Geeky "stackoverflow" has joined that trend. I'm still killing that TLD by default, but have significantly dropped its score in my FP pipeline. - "Chip"

Re: Today's Google Docs phish

2017-05-04 Thread Chip M.
I've added that to my own MassCheck queue, and will report back. - "Chip"

spample: banking credential phish using linked image (with no text)

2017-01-28 Thread Chip M.
y "skip" listing all three scenarios, in particular DMARC reports (i.e. I never "white" list, I have my rules segmented into groups that can be easily skipped). - "Chip"

Re: spample of not(?)-yet-registered "custom" URL Shortener in Phish

2016-09-25 Thread Chip M.
27;s probably trivial. > >It seems to be a diagnostic header that's only added where the URL >exits. Thanks! That makes sense. :) - "Chip"

spample of not(?)-yet-registered "custom" URL Shortener in Phish

2016-09-24 Thread Chip M.
worst/best-done campaign (WOW/Blizzard/BattleNet) I've ever seen went on for seven months, with no sign that Gmail even noticed it. :\ - "Chip"

Re: spample of "data" URL in well-crafted Phish

2016-09-24 Thread Chip M.
On Fri, 16 Sep 2016, John Hardin wrote: >Chip, could you send me some spamples of non-image data: messages >offlist? The only ones I have anywhere are images. Sent last week - thanks for your ongoing work on this John! :) After that request, I decided to add (in my post SA filter) a min

Re: drive-by malware customized to the From.RealName of actual Friends

2016-09-24 Thread Chip M.
ing to morph, so at the very least my trickle should help GoDaddy keep a (putative) detection script up to date. Plus, it's a TON more satisfying stymying the smarter-than-skwerl class of spammers. :] - "Chip" P.S. Some old friends let me crash with them for the duration of

Re: Catching well directed spear phishing messages

2016-09-15 Thread Chip M.
anks. ;) They could even be encouraged to send at least one per day, just for "practice". *** Does such software exist? I suspect it may already exist, in which case someone here _WILL_ know of it. :) It would have to be smart enough to look up the original complete email just from a (worst case) Outlook/etc forwarded email (only core headers), so may have to be platform specific (unless IMAP is sufficient?). Obligatory disclaimer: I'm a programmer, not a sysadmin. ...though XKCD 705 is among my top 10 favorite Geek webcomics. :) - "Chip"

Re: spample of "data" URL in well-crafted Phish

2016-09-14 Thread Chip M.
5.1 tests=DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, HTML_MESSAGE, MIME_HTML_ONLY, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL That puts the inventors of the Hamster Cannon in the lead, in terms of size and pandering to safe-listing "services". :( I asked the recipient/survivor of the new duo to forward them to his own account and tell me how they render in Outlook, and he kindly sent me a screenshot, mostly to show an alert that Outlook added: "If there are problems with how this message is displayed, click here to view it in a web browser." Purely IM(subjective)O, that sounds like even Outlook was a bit disgruntled with it. - "Chip"

Re: Anyone else just blocking the ".top" TLD?

2016-09-08 Thread Chip M.
or to each his/her own preferred approach. :) - "Chip"

Re: Anyone else just blocking the ".top" TLD?

2016-09-08 Thread Chip M.
y data, and is not showing up on that Surbl tld page. Please do share any more that you notice. :) ".men" is going for as low as $1.49. It's only appearing in some of my domains, but is running between about 8% and 34% of their snowshoe spam. - "Chip"

drive-by malware customized to the From.RealName of actual Friends

2016-09-08 Thread Chip M.
'm posting this in the hope that someone(s) will nudge GoDaddy and other cheap hosts to scan for offsite redirects, then test them. The drive-by-javascript at the destinations is obviously "bad", and trivially easy to recognize. - "Chip"

Re: spample of "data" URL in well-crafted Phish

2016-09-08 Thread Chip M.
scoring non-img "data" rule, and gently recommend a modest scoring img "data" rule. Everyone's mileage will vary, as always. :) - "Chip" P.S. Javascript... I agree 100% with John, while respecting AXB's right to disagree and choose his own poison. ;) I'

spample of "data" URL in well-crafted Phish

2016-08-31 Thread Chip M.
Freshly caught Spample: http://puffin.net/software/spam/samples/0042_data_embedded_phish.txt The only munging was inserting ".EXAMPLE" between "wellsfargo" and ".com". Four years ago, I read this fascinating article: http://isc.sans.edu/diary/%22Data%22+URLs+used+for+in-URL+phishin

Re: SA cannot block messages with attached zip

2016-07-13 Thread Chip M.
t nuke/quarantine them all.) A couple of years ago, I changed my post-SA Filter so it always tests the first few "raw" characters of every MIME Part, and if they're the prefix that means PKZip, I de-MIME it and send it thru my zip analyzer, regardless of ContentType or file ext. I

Re: Anyone else just blocking the ".top" TLD?

2016-07-09 Thread Chip M.
tld/stream https://www.domcomp.com/tld/top The ever-anti-reliable NameCheap is beating the pack at $0.88 per .stream domain (same as their price for .top), so I expect the popularity of .stream to continue. - "Chip"

Re: Catching well directed spear phishing messages

2016-06-28 Thread Chip M.
n requests. Note that all our domains are "Western" centric, though we have a few accounts who do have regular contact with Unicode-type nations. You all know your own email ecologies. :) +1 to all the sensible remarks about good authorization policies. The best defense has as many layers as practical. :) - "Chip"

Re: SA cannot block messages with attached zip

2016-06-08 Thread Chip M.
e zips (when they appeared, as mentioned in my previous post). That does have a higher FP risk, since it's reasonable to zip huge doc files, however in practice they're rare, and I have an excellent Quarantine/FP pipeline. A friend sent me this cool MagicNumber look up site: filesignatures.net Any other suggestions for file types to add? - "Chip"

Re: SA cannot block messages with attached zip

2016-05-20 Thread Chip M.
:) We've had a very low FP rate on the above, and haven't had any noticeable user pushback. There have been enough high profile infections (at least two hospitals), that most endusers have been grateful and understanding. >Doing it properly requires a non-trivial amount of coding. Ye

re: exploitable LinkedIn forwarder/whatever

2016-05-20 Thread Chip M.
uldn't blame any non-techie who succumbed to the double-whammy of a URL with a very familiar domain sent from the cracked account of a bona fide friend. :( - "Chip"

exploitable LinkedIn forwarder/whatever

2016-05-17 Thread Chip M.
rinsed, stewed, then decided to post here. *** Does anyone have a contact at LinkedIn ops? *** Sadly, LinkedIn follows the Google/Gmail model of failing to make core functionality (like reporting spam) useable without disabling/lowering one's browser security settings/shields. :( - "Chip"

Re: new(ish) malware: RTF with MIME payload

2016-05-05 Thread Chip M.
ose. We can individually "skip" list that rule if needed, just like we already do with Word macros and other Pakled-icity. ;) - "Chip"

malware campaign: javascript in ".tgz"

2016-04-21 Thread Chip M.
r "rar" extraction, which may explain the recent rise of rar javascript email malware). I've only taken a quick look at the payload. It's javascript, but definitely different from past campaigns. I've been seeing a high level of "calibration" spam for over a week, so I suspect this is a new botnet going live. :( - "Chip"

new(ish) malware: RTF with MIME payload

2016-03-19 Thread Chip M.
Starting about two hours ago, more than 80% of my real-time honeypot spam is a new malware campaign. Full spample (with redacted/munged email addresses and Message-ID): http://puffin.net/software/spam/samples/0039_mal_rtf_mime.txt This is a variation on an XML file malware campaign that b

RE: SPAM from a registrar

2014-05-16 Thread Chip M.
ion and on TLD-to-Nation tests, then retest (with a different balance of scores) typically about 1 to 48 hours after initial arrival, at which point more than 99% are on multiple reliable blocklists. I briefly hand check the rest. That takes much of the stress and uncertainty out of filtering. :) - "Chip"

Re: unusual new pump-and-dump campaign ("RCHA")

2014-04-16 Thread Chip M.
are attachments, all small, and hitting some of the rare traps that the stock and calibration payloads have hit. I have NEVER seen anything like this botnet. - "Chip" P.S. If it's of use to anybody, we maintain a list of scammed stock symbols and scammer phone numbers:

unusual new pump-and-dump campaign ("RCHA")

2014-04-08 Thread Chip M.
links, X-Mailer, and fake Unsub headers, combined, are an excellent fingerprint. They're trying to imitate ESP/Bulk senders, but these are mainly coming from "normal" ISP IPs. I've added rules that only score those headers for non-ESP/Bulk IPs. Of course, the very first thing I did was add "RCHA" to my list of scammer symbols. :) - "Chip"

Re: Rule FH_RANDOM_SURE causing FPs

2014-01-16 Thread Chip M.
the domain admin for them. I'm planning some data-mining this weekend, and would be happy to check more data (mild brag: I finally added flagging to my data-mining tools, so it will auto-log, even if I forget to explicitly check). :) - "Chip"

new (?) Google Translate trick using URL Shorteners

2012-12-10 Thread Chip M.
from Freemailers Personally, I've jacked up the score of "HTTP_EXCESSIVE_ESCAPES", however I do see enough legit-but-thick senders who hit it, that I understand why it's somewhat low. John H: I'll send you a couple of raw corpses so you can wave your RE magic wand. :) - "Chip"

re: Trouble with bayes poisoning spam

2012-11-30 Thread Chip M.
st the outgoing mail of new customers. :) This week, I posted a list of proposed 2013 projects to my volunteers, and at the top is exporting our MassCheck data for SA. Also on the list are phish and snowshoe data sharing. :) As soon as I've finished a couple of timesink projects, I'll start on those. - "Chip"

another malware MIME header trick that works with at least one email client

2012-07-25 Thread Chip M.
tool!), and with minimal to no other defensive layers. Let's give the little guy/gal some help. :) - "Chip" P.S. I tested this by manually removing the base64 encoded payload, substituting in the base64 portion of a non-attachment HTML part from a ham, then reinjecting the ra

new twist on BitLy

2012-05-02 Thread Chip M.
y prejudice that it's ok to score this domain heavily, as long as one has a good quarantine and FP pipeline. I'll check some more corpora this weekend, and report back if there's any non-trivial ham using this domain. - "Chip"

Re: all spam emails from mailengine1.com servers

2011-10-21 Thread Chip M.
. Robert, thanks for asking! While generating that data, I had an excuse to improve that report. I also found a "dangling" legacy IP block with a lower spam score, which should have been deprecated years ago, and now has been. :) - "Chip" P.S. The Geek volunteer who h

new technique: borked zip attachment w/malware

2011-09-30 Thread Chip M.
obust FP pipeline, so what makes me feel good, may not work as well for everyone. :) Does anyone know if any mainstream email client can open such a file? I don't use Outlook, so maybe someone who does could zip up something benign, email it to themself, grab the network image, hack the CT filename as above, re-inject it, then try opening it. - "Chip"

Re: new gappy domain campaign (w/sample)

2011-02-10 Thread Chip M.
's a major reason that I expect these to morph, real soon. :\ In the past, that guy's campaigns have had a similarly low hit rate on PBL. I've always wondered how he/they achieve that. - "Chip"

application/octet-stream obfuscated JPEGs

2010-09-20 Thread Chip M.
oes have the exact same JPEG header size that I've previously reported (623 bytes). It also continues this spammer's use of random (ALWAYS wrong) Realnames in the To header. Those two tests, plus nation of origin, are my main test hits. So far, none have snuck thru my last layers of defense. - "Chip"

Re: Yahoo HTML Base64 Attachments

2010-09-20 Thread Chip M.
8th anniversary of the TV broadcast debut of Firefly. :) Keep flyin', - "Chip"

Re: New plugin: DecodeShortURLs

2010-09-20 Thread Chip M.
they run the actual tests, so they have Complete Control. It's been my experience that not-stupid endusers who are given control are happy users. They're full participants in the process. :) - "Chip"

Re: Filtering zip spam

2010-04-28 Thread Chip M.
;) Implementing the basic properties extraction was trivial. Thinking thru how I wanted to handle the rules was more of a challenge. :) Figured I'd share where I'm at, and pick the big brains. :) - "Chip" P.S. I am also seriously considering adding the ability to extract any s

new PDF "Launch" malware exploit (with sample)

2010-04-28 Thread Chip M.
I've added "script.vbs" to my instant-death PDF word scans. I'll be asking some of my most diverse volunteers to run some ham-PDF-only MassChecks tonight, and see if any of my new rules mis-fire. Given the number of times HTML "naughty" tags appear in ham, I will resist assuming my "reasonable" restrictions won't hit any. - "Chip"

Re: Finding URLs in html attachments

2010-03-02 Thread Chip M.
makes perfect sense as a general principle, however, in the case of these phish, social engineering is the vector for their display. Apologies if I'm missing blatant Perl or SA architecture issues, about which, I am only an egg. - "Chip"

Re: Spamhaus DBL

2010-03-02 Thread Chip M.
s (59% today, average of 49% last month), with some containing garbage/low-ascii characters at the end of the URL. I've been scoring RU at 95% of kill for a while, so those aren't an issue (for me). Technically, those have been ramping up for a while. - "Chip"

new (small) shortener campaign & suggestion for URLRedirect

2010-02-24 Thread Chip M.
appears Digg does not check any blocklists. :( These services are just too dang tempting a target, so I expect these campaigns to continue. More fevered ramblings from one of your mostly harmless Iowa Geeks, - "Chip"

Phish - two simple techniques that make the "obvious" tests viable

2010-02-24 Thread Chip M.
use Nation-based testing (they aren't forced to include all of the USA, when all they really want is eBay/Paypal/etc). I hope that's both clear and useful. I've got a rather bad case of flu, which led to me :) wanting to hand verify several hundred phish hits, but it could also have resulted in more obtuse language than usual from me. - "Chip"

Re: pill image spam learns to walk

2010-01-11 Thread Chip M.
also aware of the issues surrounding people potentially >uploading images and then linking to them from spam websites or >spam. That's why I've put http referer restrictions in place. Perhaps redirecting to an image saying something like "this is spam"? :) What about requiring registration? Yes, it's not enough to stop the most determined, but will whittle it down to the least stupid. - "Chip"

Re: facebook Spam Question

2009-11-08 Thread Chip M.
seen a tiny trickle of viral stuff forged as coming from them, but they're a logical target. Pre-emptive first strike... with spam, there's no reason not to. :) Good luck! - "Chip"

Re: spam from noave.net 74.63.109.*

2009-10-08 Thread Chip M.
tious, since MY Ham is not YOUR Ham. :) When in doubt, score and/or quarantine. - "Chip"

Re: Lots of 419/scam and investment spams getting through suddenly

2009-06-18 Thread Chip M.
o, it's worth considering a CAUTIOUS score. John Hardin wrote: >sa-update won't bring 3.2.1 up to 3.2.5; you're not getting the >up-to-date rules, which may catch those. +1 Always VERY good advice, particularly given the age difference. :) - "Chip"

Re: Botnet spam not being caught

2009-06-14 Thread Chip M.
he Russia TLD 1 contained a BlogSpot subsite 4 were AdvanceFee scams I also found 518 of those had forged the SMTP Sender as being the same domain (and probably the exact same account) as the Recipient. You might want to make some meta rules for those two cases (China TLD in a URL, Sender == Recipient). - "Chip"

Re: some URIBL accidentally listed .org?

2009-06-14 Thread Chip M.
DOB ("Day Old Bread") had the same problem last year: http://mail-archives.apache.org/mod_mbox/spamassassin-users/200810.mbox/%3cva.33f1.14690...@news.conactive.com%3e With software bugs, lightning often DOES strike twice in the same spot. :) - "Chip"

Re: please help, getting hammered with snowshoe spam

2009-02-12 Thread Chip M.
rch. :) We're split among several different hosts, so the only way it would be viable to use your lists in real-time, would be to set up our own DNS server, only known to project members. Since most of us are only receiving a trickle of snowshoe spam, that's not viable at this time. The ones who receive more than a trickle, receive a FLOOD. As I mentioned, in some cases 80% of their FNs are from snowshoers. - "Chip"

Re: please help, getting hammered with snowshoe spam

2009-02-12 Thread Chip M.
currently scored at the equivalent of about 1 SA point. I forgot to mention another combo test: if it's on both Barracuda and the Day-Old-Bread list, I add the equivalent of about 1 SA point. Zero FPs so far. I'll review all those scores and tests in a few more weeks. - "Chip"

Re: please help, getting hammered with snowshoe spam

2009-02-04 Thread Chip M.
This snowshoe stuff has been a PITA for a while. For most of my users (particularly the Geeks), it's not even on their radar. For others, (inluding my most complex domain), 80% of their FNs are from snowshoers. As well as the usual battery of anti-spam tests, I'm using a layered/meta approach of

Re: please help, getting hammered with snowshoe spam

2009-02-04 Thread Chip M.
Dennis Hardy wrote: >Do people generally have good non-FP experience with BRBL? I am >thinking of bumping up the score, but I get so much spam per day >it is hard to check for FPs with it enabled. Dennis, it depends on what sort of ham your people receive. For evaluation purposes, I've been runni

new(?) Geocities subsite obfuscation

2008-06-16 Thread Chip M.
those as simple rules. Other than borked mailing lists, can anyone recall seeing either of those patterns in a legitimate emailed URL? Stay dry, - "Chip"

Re: yahoo.co.uk

2008-02-27 Thread Chip M.
urus will whip you up a rule. :) Is there anything else that stands out in these? - "Chip"

Re: new google trick: "docs"

2008-02-27 Thread Chip M.
eople that way, report >them to Google. I commend your optimism. :) - "Chip" P.S. After a slow start, Uribl's fan-tastic new subsite listings are producing excellent results. We auto-quarantine all Blogspot, Geocities, etc emails, then re-run Uribl a few hours later, and are averaging about a 75% to 95% hit rate! Pretty good for such a new project. :)

new google trick: "docs"

2008-02-27 Thread Chip M.
triggers on _ANY_ "unusual" params in a Google url? In other words, enumerate the legit ones, and score all others. The only legit form of pre-emptive strike is the kind against spammers (IMO). :) - "Chip"

Re: Cute - another google spam trick!

2008-01-20 Thread Chip M.
late-ish, I could be missing the obvious.) - "Chip"

Re: Googlepages & Livefilestore spams

2008-01-16 Thread Chip M.
The latest variant is "gooogle.com", which is a legit alias for Google, and appears to work with all the regular spammer trick parameters. I've also seen two more google TLD variants. - "Chip"

Re: are the NORMAL_HTTP_TO_IP scores still valid?

2008-01-16 Thread Chip M.
cated users is so high, that a 1-7 day delay is acceptable, given that these almost always occur in non-business marketing junk. It really boils down to your userbase and your available tools. - "Chip"

  1   2   >