On Wed, 2 May 2018, Joe Acquisto-j4 wrote:

On 5/2/2018 at 2:57 PM, in message
<0e5889ab-b61a-36ba-6b28-549f2c365...@ena.com>, David Jones <djo...@ena.com>
wrote:
On 05/02/2018 01:21 PM, Joe Acquisto-j4 wrote:
One slipped through, with this subtle sig line (thought it might brighten
someones day . . . )

"Note: Failure to Verify will lead to final termination of your email
account.

Technical Team
Email Administrator
All Right Reversed 2018.(c)"


Please post the full email, with all headers, minimally redacted to
pastebin.com and send us a link.

--
David Jones

It's been a while, but I think I did it properly:

https://pastebin.com/Sw8R0QPe

Do you have the DecodeShortURLs plugin installed in your SA?

The target of that tinyurl.com is listed in URIBLs and SA will fire on it if you have DecodeShortURLs functional.

For that message I get:

hecker-Version SpamAssassin 3.4.1 (2015-04-28) on s-l107.engr.uiowa.edu
Content analysis details:   (8.1 points, 6.0 required, autolearn=no)

 pts rule name              description
---- ---------------------- ------------------------------------------
 0.0 HAS_SHORT_URL          Message contains one or more shortened URLs
 2.5 SEM_FRESH              Contains a domain registered less than 5 days ago
                            [URIs: erumsadet.info]
-0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at http://www.dnswl.org/, no
                            trust
                            [40.92.2.16 listed in list.dnswl.org]
 0.1 L_BANK_PHISH3          BODY: Possible bank phish
 0.3 L_UI_PHISHb3           BODY: possible email acct phish
 0.0 T__BOTNET_NOTRUST      Message has no trusted relays
 0.9 FORGED_HOTMAIL_RCVD2   hotmail.com 'From' address, but no 'Received:'
 0.5 BOTNET_IPINHOSTNAME    Hostname contains its own IP address
[botnet_ipinhosntame,ip=40.92.2.16,rdns=mail-oln040092002016.outbound.protection.outlook.com]
 0.0 RCVD_IN_HOSTKARMA_YE   RBL: HostKarma: relay in yellow list (varies)
                          [40.92.2.16 listed in hostkarma.junkemailfilter.com]
 0.0 URIBL_RED              Contains an URL listed in the URIBL redlist
                            [URIs: erumsadet.info]
 0.0 BOTNET_SERVERWORDS     Hostname contains server-like substrings
[botnet_serverwords,ip=40.92.2.16,rdns=mail-oln040092002016.outbound.protection.outlook.com]
 0.7 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)
 0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail 
provider
                            (jln4deafkids[at]hotmail.com)
 0.8 BAYES_50               BODY: Bayes spam probability is 40 to 60%
                            [score: 0.5000]
 0.0 HTML_MESSAGE           BODY: HTML included in message
-0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from 
author's
                            domain
-0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
 0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily 
valid
 0.6 SARE_HTML_COLOR_B      RAW: BAD STYLE: color: too light (rgb(n))
 0.0 T__KAM_SHORT           KAM URL shortner fired
 0.8 KAM_INFOUSMEBIZ        Prevalent use of .info|.us|.me|.me.uk|.biz domains 
in
                             spam/malware
 0.0 T__FROM_OUTLOOK        From microsoft outlook/hotmail servers
 0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay lines
 0.0 T__RECEIVED_2          More than one untrusted relay
 0.8 RDNS_NONE              Delivered to internal network by a host with no rDNS
 0.2 L_FROM_OUTLOOK         From microsoft outlook/hotmail servers




--
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to