Another... Peculiar (spoofed) Email...

Page 1 of 2 12 LastLast

  1. Posts : 1,800
    10 Home 64-bit | v22H2 | Build - 19045.3930
       #1

    Another... Peculiar (spoofed) Email...


    In this day and age I shouldn't find this surprising as the ingenuity of some users shows no bounds. If they could only put their resourcefulness to benevolent instead of malevolent efforts the world's problems would be solved in a month. Okay, six months, but I digress.

    There hasn't been many, maybe four since the end of Summer but I receive emails that are no where close to my addy. In the accompanying attachment I changed my address to all capital X's with the provider in lower case x's, my address shows up three times in the original message.
    The address this email was originally spoofed from is s....k33 at mail dot ru which is shorter by three characters and does not contain any corresponding characters except for the at and dot symbols.

    I have checked the pwned site and yes my addy is listed but over the years I really don't receive a lot of spam maybe one a month. This one is the first since November.
    • I have marked the email as phishing but couldn't block the sender because that action wasn't available probably another symptom of spoofing, how do you block an address that doesn't exist? I did send an abuse report to my email provider.
    • Do I send an abuse report to admin at actonalumni dot org the sender? Maybe that doesn't exist as well.
    • The rotrax dot websitewelcome dot com (the man in the middle) addy throws a 404 error and when you search for rotrax dot com it's for sale by HugeDomains dot com, now isn't that surprising!

    Such a PITA!

    @Infrasonic;'s reply in @FrankS's thread explains this well:
    Infrasonic said:
    If they put your address on a BCC spam distribution list (very likely) then the only address path visible in the headers would be the ' to' which is the senders, and that might well be a spoofed address anyway.

    Another trick they use is to send you spam from your own address (spoofed) to get around the 'exclusive' inbox settings (which would otherwise route all non saved or whitelisted contact addresses to the spam folder automatically).
    Make sure you have active content and graphics settings off for your inbox too, as that can confirm your address is live by 'phoning home', and then you automatically get added to a plethora of spam lists.

    Check all your email addresses on here too...https://haveibeenpwned.com/
    If you get a positive hit that would explain high spam levels.
    I've got one ancient (1998) hotmail address that gets 3 hits on that site, and unsurprisingly gets a load of spam...

    Most of the major webmail services now use DMARC authentication, so any emails from organisations that also use DMARC should be end to end validated and indicated in some way as from a known sender. In the message source headers you'll see DKIM, SPF and DMARC statuses mentioned.
    If you need more do a search for spoofed emails. I just wanted to put my experience out here as another example.

    Another Peculiar Email.txt

    p.s. I marked my thread solved, but for now there really is no way to stop it.
      My Computers


  2. Posts : 16,325
    W10Prox64
       #2

    Sometimes I go through the effort to do this:

    View the header of the message.
    Find the line in the header with "Received: from" and either EHLO or HELO, example:
    Code:
    Received: from 127.0.0.1  (EHLO r229.subs.subway.com) (66.117.17.229)
    Run a whois on that domain, or go to spamcop.net and parse that domain IP address for the abuse contact info (Trace IP).
    Send the entire email, including the raw header information to the abuse address.
    Sometimes you get a bit of relief.
    Note: Not saying subway is spam, just used it as an example.
      My Computer


  3. Posts : 1,800
    10 Home 64-bit | v22H2 | Build - 19045.3930
    Thread Starter
       #3

    Thanks, simrick.

    I did a search on the email for EHLO but found what I was looking for under HELO:
    Code:
    Received: from grf178.internetdsl.tpnet.pl ([83.3.187.178]:39104 helo=uKHtvLyN)
    	by rotrax.websitewelcome.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
    	(Exim 4.91)
    	(envelope-from <admin@actonalumni.org>)
    	id 1gh5od-003MH9-OW; Tue, 08 Jan 2019 22:50:08 -0600
    but there isn't an IP there so I used the Source-IP: 83.3.187.178 in the email abuse section and found the email came from Poland.

    Using the MXToolbox and their blacklist check I also found 83.3.187.178 is on 15 out of 95 known lists. rotrax.websitewelcome.com truncates to websitewelcome.com and whois lists that as Whois Privacy Protection Service, Inc.

    Hunting this stuff down is like ridin' a merry go round and missing the ring every time you pass it. Subway an spam? Subway does have some kosher franchises, but yes I knew what you meant, thanks for the clarification.

    For any newcomers to email sleuthing it may seem counter-intuitive but the beginning of an original message starts at the bottom and goes up.
    When you read an email header, the data is in reverse chronological order, meaning the info at the top is the most recent event. Therefor if you want to trace the email from sender to recipient, start at the bottom. Examining the headers of this email we can see several things.

    What Can You Find in an Email Header?
      My Computers


  4. Posts : 16,325
    W10Prox64
       #4

    Anak said:
    Thanks, simrick.

    I did a search on the email for EHLO but found what I was looking for under HELO:
    Code:
    Received: from grf178.internetdsl.tpnet.pl ([83.3.187.178]:39104 helo=uKHtvLyN)
        by rotrax.websitewelcome.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
        (Exim 4.91)
        (envelope-from <admin@actonalumni.org>)
        id 1gh5od-003MH9-OW; Tue, 08 Jan 2019 22:50:08 -0600
    but there isn't an IP there so I used the Source-IP: 83.3.187.178 in the email abuse section and found the email came from Poland.

    Using the MXToolbox and their blacklist check I also found 83.3.187.178 is on 15 out of 95 known lists. rotrax.websitewelcome.com truncates to websitewelcome.com and whois lists that as Whois Privacy Protection Service, Inc.

    Hunting this stuff down is like ridin' a merry go round and missing the ring every time you pass it. Subway an spam? Subway does have some kosher franchises, but yes I knew what you meant, thanks for the clarification.

    For any newcomers to email sleuthing it may seem counter-intuitive but the beginning of an original message starts at the bottom and goes up.
    I hear ya. It has gotten ridiculous...
    FYI: You could report the email to these addresses, and they may be able to do something:
    Parsing input: 83.3.187.178
    More Information.
    Reporting addresses:
    cert.opl@orange.com
    abuse@tpnet.pl
      My Computer


  5. Posts : 1,800
    10 Home 64-bit | v22H2 | Build - 19045.3930
    Thread Starter
       #5

    Already have, if I hear anything back I'll post it.
      My Computers


  6. Posts : 226
    Many
       #6

    If more providers and companies took advantage of DMARC, which relies on SPF and DKIM configuration, it would make mail spoofing a bit more difficult (not impossible)
      My Computer


  7. Posts : 1,800
    10 Home 64-bit | v22H2 | Build - 19045.3930
    Thread Starter
       #7

    Anak said:
    Already have, if I hear anything back I'll post it.
    Almost forgot, received canned replies from your two simrick and the one I sent to gmail, thanking me for alerting them and they will investigate.
      My Computers


  8. Posts : 16,325
    W10Prox64
       #8

    Anak said:
    Almost forgot, received canned replies from your two simrick and the one I sent to gmail, thanking me for alerting them and they will investigate.
    That's good. I'm sure you won't hear anything else from them, but maybe your efforts will have helped.
      My Computer


  9. Posts : 1,800
    10 Home 64-bit | v22H2 | Build - 19045.3930
    Thread Starter
       #9

    Me to, I hope so.

    To paraphrase: The only thing necessary for the triumph of evil is for good people to do nothing.
    Attributed to multiple authors.

    Have seen this yet? The 773 Million Record Collection #1 Data Breach Seems I may have opened a can of worms.
      My Computers


  10. Posts : 16,325
    W10Prox64
       #10

    Yes, actually, I saw this thread
    Another Major Email Password Breach - Windows 10 Forums
    and am about finished having a heart attack now.......LOL So sick of all this.....have to go read your thread now....
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 08:41.
Find Us




Windows 10 Forums