Educause Security Discussion mailing list archives
Re: Recent Phishing Uptick (watch list of web hosting sites and Cisco Ironport rule for warning insertion)
From: Bob Bayn <bob.bayn () USU EDU>
Date: Thu, 20 Feb 2014 17:11:29 +0000
Paul Chauvet [chauvetp () NEWPALTZ EDU] asked: P.S. Would you be willing to share (on-list or off-list) a list of the URLs of these hosting services that you use this for? Actually, I already did. ;-) See the link included in our warning message: https://it.usu.edu/computer-security/be-an-internet-skeptic/form-services/ It includes contact information to report abuse to each service provider. I'd be glad to hear of others we haven't detected yet here. As for the rule in our Cisco Ironports, in summary it goes like this: In our Cisco IronPort C670 Email Security Appliance 1. Go to the "Mail Policies" menu and select "Text Resources" (way down at the bottom) 2. Create a text resource (which I called "phishing_form") - of type "Disclaimer Template" 3. Enter the warning you want to appear, remembering that you can use "$MatchedContent" to include the string you detected in the message 4. "Submit" to save. 5. Now go back to the "Mail Policies" menu and select "Incoming Content Filters" 6. Add a filter (which I called "phish_forms") that has two conditions: * Message Size - I chose a rule of body-size < 12000 to skip over the big messages that phishers don't send * Message Body or Attachment - build a regex match rule which consists of a bunch of "or" entries for all the web hosting sites in your watch list. (wait for it) 7. Add two actions for the filter: * Add Disclaimer Text - add that text resource you made above "phishing_form" to the top of the message body * Send Copy (Bcc:) - to some monitoring address so you can see how the rule is behaving (this may be a temporary action for debugging or a permanent one for reporting/blacklisting) 8. "Submit" this and then "Confirm Changes" to deploy it all 9. What is my watch list "or" rule? Build your rule in steps. One typo and you are screwed. This is mine: body-contains("(\\.0ad\\.info|\\.1eko\\.com|\\.adobeformscentral\\.com/|\\.atwebpages\\.com|\\.bravesites\\.com|\\.byethost\\.com|\\.coffeecup\\.com/forms/|\\.dasfree\\.com|\\.formbuddy\\.com/cgi-bin/formdisp\\.pl|\\.formees\\.com|\\.formoid\\.com|\\.formpl\\.us/form/|\\.hostingsiteforfree\\.com|\\.i-m\\.co/|\\.jigsy\\.com|\\.jimdo\\.com|forms\\.logiforms\\.com/formdata/|\\.mooform\\.com/form/|\\.noads\\.us|\\.pandaform\\.com|pastehtml\\.com|\\.phpforms\\.net|\\.the\\-webmail\\.com/|\\.tripod\\.com/|\\.twomini\\.com|\\.ucoz\\.|/use/.+/form1\\.htm|\\.webs\\.com/|\\.websitewizard\\.com|\\.yolasite\\.com|\\.zohosites\\.com/)", 1) Lately the most common hits here have been: yolasite, jimdo, webs, i-m, tripod, jigsy, bravesites, the-webmail, and websitewizard. BTW, the one I highlighted in green attempts to find links to hacked PHPformgenerator forms on any host. Good luck to all of us and a pox on phishing spammers! Bob Bayn SER 301 (435)797-2396 IT Security Team Office of Information Technology, Utah State University Do you know the "Skeptical Hover Technique" and how to tell where a web link really goes? See: https://it.usu.edu/computer-security/computer-security-threats/articleID=23737
Current thread:
- Re: Recent Phishing Uptick (watch list of web hosting sites and Cisco Ironport rule for warning insertion) Bob Bayn (Feb 20)