Re: blacklisting the likes of sendgrid, mailgun, mailchimp etc.

2020-09-18 Thread John Hardin

On Thu, 17 Sep 2020, Kevin A. McGrail wrote:


sendgrid has seriously fallen from grace this year despite numerous
attempts to contact them and assist.

https://krebsonsecurity.com/2020/08/sendgrid-under-siege-from-hacked-accounts/
also sheds light on the issue too.


There's also a RBL for compromised sendgrid user IDs. See the thread 
starting at:


https://marc.info/?l=spamassassin-users=159803815425176=2


--
 John Hardin KA7OHZhttp://www.impsec.org/~jhardin/
 jhar...@impsec.org pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
---
  All I could think about was this bear is so close to me I can
  see its teeth. I could have kissed it. I wished I had a gun.
 -- Alyson Jones-Robinson
---
 Tomorrow: Talk Like a Pirate day


Re: blacklisting the likes of sendgrid, mailgun, mailchimp etc.

2020-09-18 Thread Rob McEwen

On 9/18/2020 6:38 AM, Loren Wilton wrote:
https://krebsonsecurity.com/2020/08/sendgrid-under-siege-from-hacked-accounts/ 


also sheds light on the issue too.


. SendGrid knows (or should konw) that it has compromised 
accounts. It could find out what some of them are for free by 
downloading Rob's list of 25 or so compromised accounts.



I strongly suspect that many of those accounts on our 2 Sendgrid lists 
are just plain 'ol spammers, NOT compromised. So some are compromised, 
some are spammers. And the list has grown to 594 SendGrid IDs 
(currently, as I type this) - much more than 25! Also, the list of 
domains found at the end of the SMTP-FROM that we're also deeming as 
spam or malicous has likewise grown to 87 domains


SEE:
https://www.invaluement.com/spdata/sendgrid-id-dnsbl.txt

AND:
https://www.invaluement.com/spdata/sendgrid-envelopefromdomain-dnsbl.txt
https://www.invaluement.com/spdata/sendgrid-envelopefromdomain-dnsbl-rbldnsd.txt
(2nd one formatted for rbldnsd)

I'm seeing evidence/reports that Sendgrid is likely using this data to 
greatly improve their system, and that this (maybe combined with their 
other efforts?) is finally starting to improve things? So that is good 
news. But I'm also shocked at how many hours go by where certain 
egregious accounts on our Sendgrid DNSBLs STILL stay in circulation 
while continuing to send spams, sometimes criminal phishing spams. But I 
also understand that they have to be careful about overly trusting 3rd 
party data, to ensure that they don't overreact to what might be an 
occasional false positive. It shouldn't be too long before they figure 
out that False Positives in those two Sendgrid lists are very very 
rare... practically non-existent. They probably should at least PAUSE 
campaigns pending further investigation. They should at least do that 
much, imo.


(They MIGHT also be suffering from the increasingly common and flawed 
view in the ESP industry - that not-illegal and CAN-SPAM-compliant mail 
is always legit and not spam - mistakenly not understanding that spam 
doesn't have to be illegal and malware, in order to be unsolicited and 
undesired by the recipient (aka "spam"). Maybe them seeing those types 
of accounts in our data is confusing them? I don't know - but much of 
the ESP industry is in great need of a "reset" - and this data is a good 
first step towards that!)


I was planning to spend much time this past week (1) adding this data to 
my own customer's direct query and rsync feeds, and (2) improving the 
instructions, including providing more specific instructions for adding 
this free version to various MTAs - but all that time got put into 
performance and effectiveness enhancements instead. Therefore, the data 
has greatly improved in just the past few days. New data sources were 
added into the mix - and many others of these spams these that were 
previously getting missed, are now getting caught - and the time from 
such a spam being first received - to that data getting into the list - 
has improved from about 1/2 a minute, to just a few seconds!


-- Rob McEwen invaluement.com



RE: blacklisting the likes of sendgrid, mailgun, mailchimp etc.

2020-09-18 Thread Marc Roos
 
But now it is Sendgrid tomorrow it is some other company, fact is were 
stuck with this trend of spammers outsourcing their spam trying to mix 
it with legitimate email. 

Legitimate clients are not aware of this and use these companies because 
of whatever ill advised reason. I am thinking about documenting this 
behaviour on 'my' hosting pages so people can read and be aware of this. 
I think if everyone does this, legitimate clients will stay away from 
these businesses. And if they stay away from these businesses, it is for 
'smaller' providers easier to manage (eg. blanket block the whole owned 
range)





-Original Message-
To: users@spamassassin.apache.org
Subject: Re: blacklisting the likes of sendgrid, mailgun, mailchimp etc.

> https://krebsonsecurity.com/2020/08/sendgrid-under-siege-from-hacked-a
> ccounts/
> also sheds light on the issue too.

. SendGrid knows (or should konw) that it has compromised 
accounts. 
It could find out what some of them are for free by downloading Rob's 
list of 25 or so compromised accounts. It could find out what some of 
the other 400 are for $15 each, and could find out what some of the 
major offenders are for $400 each. Let's see, 400 compromised accounts 
times $400 is $16,000 dollars. SendGrid or Twillio can't afford a 
$16,000 cash outlay to find the account names of the major compromised 
accounts? Their head of security probably gets that much a month in 
salary and bonuses. It would be a trivial expense.

So what could they do once they knew which acocunts are compromised?
Are they helpless, and can only wring their hands and issue press 
releases saying They Have A Plan?

No. They can SHUT THE DAMN ACCOUNTS DOWN. Issue refunds to the owners if 
they feel generous. Tell the owners to open new accounts with 2FA.

But they won't do this, because they get their money from sending spam.

Loren





Re: blacklisting the likes of sendgrid, mailgun, mailchimp etc.

2020-09-18 Thread Loren Wilton

https://krebsonsecurity.com/2020/08/sendgrid-under-siege-from-hacked-accounts/
also sheds light on the issue too.


. SendGrid knows (or should konw) that it has compromised accounts. 
It could find out what some of them are for free by downloading Rob's list 
of 25 or so compromised accounts. It could find out what some of the other 
400 are for $15 each, and could find out what some of the major offenders 
are for $400 each. Let's see, 400 compromised accounts times $400 is $16,000 
dollars. SendGrid or Twillio can't afford a $16,000 cash outlay to find the 
account names of the major compromised accounts? Their head of security 
probably gets that much a month in salary and bonuses. It would be a trivial 
expense.


So what could they do once they knew which acocunts are compromised?
Are they helpless, and can only wring their hands and issue press releases 
saying They Have A Plan?


No. They can SHUT THE DAMN ACCOUNTS DOWN. Issue refunds to the owners if 
they feel generous. Tell the owners to open new accounts with 2FA.


But they won't do this, because they get their money from sending spam.

   Loren