On 6/28/2012 2:59 PM, VinnyHIDDEN@@Dell.com wrote: The most common way I see this happen is a user receives a forged email from "support" phishingfor their email credentials. They supply them and then it's a free-for-all from a botnet of accountssending as that user through your mail server.that certainly didn't happen in this case. the particular user is VERY tech savvy and would never do anything like taht. the password must have been compromised in some other way. The most effective way I've found to combat this is to apply the recommended settings, in particularg_safe_smtp which requires that users authenticating to relay via SMTP have recently also authenticatedvia POP3/IMAP. This seems to have effectively stopped all of this type of abuse on the systems I run. Thisdoesn't stop end users from giving away their credentials of course, but it helps prevent the abuse of yourserver in the end... at least until the people stealing the credentials realize they can get around thisby authenticating via POP3/IMAP prior to relaying via auth SMTP. :(i had this set MANY moons ago on dmail. however, i stopped using it, since as i recollect, you couldn't set the allowable interval between pop/imap login and send request.and, as you say, it's easily gotten around.david cammadvanced web systemskeller, tx -Vinny -----Original Message----- From: David Camm [mailtoHIDDEN@advwebsys.com] Sent: Thursday, June 28, 2012 2:32 PM To: SurgeMail List Subject: [SurgeMail List] customer email account hijacked - anything i can do? just got a call from a customer. he's getting a huge number of non-delivery notices for emails he did not send. none of the 'to' addresses are in his address book so it's not a trojan or virus on his workstation. i looked at a few of the returned messages and they all look like this: X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=77.222.42.120; THIS IP IS DIFFERENT ON EACH MSG Date: Thu, 28 Jun 2012 21:30:40 +0300 From: Paul DeLay <HIDDEN@r@onebrainmarketing.com> THE NAME IS DIFFERENT ON EACH MSG Organization: mbpdsy X-Priority: 3 (Normal) Message-ID: <744914006HIDDEN@28213040@onebrainmarketing.com> To: chris@baker884.fsnet.co.uk Subject: Look at Pic No. 776 MIME-Version: 1.0 Content-Type: text/plain; charset=us-asciislplavsic Content-Transfer-Encoding: 8bit X-Authenticated-User:HIDDEN@r@onebrainmarketing.com then there's some nasty text. i had him change his password immediately. looking at the outbound queue, there are still a few message from him awaiting delivery. they all have different 'from' ip addresses. i've deleted them. since we're very strict about requiring authentication for smtp, the only thing i can think of is that his password was guessed. anyone have any ideas as to how this can be prevented - other than strong passwords? david camm advanced web systems keller, tx
The most common way I see this happen is a user receives a forged email from "support" phishing
The most effective way I've found to combat this is to apply the recommended settings, in particular
-Vinny -----Original Message----- From: David Camm [mailtoHIDDEN@advwebsys.com] Sent: Thursday, June 28, 2012 2:32 PM To: SurgeMail List Subject: [SurgeMail List] customer email account hijacked - anything i can do? just got a call from a customer. he's getting a huge number of non-delivery notices for emails he did not send. none of the 'to' addresses are in his address book so it's not a trojan or virus on his workstation. i looked at a few of the returned messages and they all look like this: X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=77.222.42.120; THIS IP IS DIFFERENT ON EACH MSG Date: Thu, 28 Jun 2012 21:30:40 +0300 From: Paul DeLay <HIDDEN@r@onebrainmarketing.com> THE NAME IS DIFFERENT ON EACH MSG Organization: mbpdsy X-Priority: 3 (Normal) Message-ID: <744914006HIDDEN@28213040@onebrainmarketing.com> To: chris@baker884.fsnet.co.uk Subject: Look at Pic No. 776 MIME-Version: 1.0 Content-Type: text/plain; charset=us-asciislplavsic Content-Transfer-Encoding: 8bit X-Authenticated-User:HIDDEN@r@onebrainmarketing.com then there's some nasty text. i had him change his password immediately. looking at the outbound queue, there are still a few message from him awaiting delivery. they all have different 'from' ip addresses. i've deleted them. since we're very strict about requiring authentication for smtp, the only thing i can think of is that his password was guessed. anyone have any ideas as to how this can be prevented - other than strong passwords? david camm advanced web systems keller, tx
Last Message | Next Message