Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Anyone Here an Email IT/server Guru?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 06:57 AM
Original message
Anyone Here an Email IT/server Guru?
Edited on Fri Jun-11-04 07:31 AM by Crisco
situation:

Someone has been trying to hack our server at work to send out spam. It's configured in such a way that the only way we can send email from our work address is to be on a company computer w/assigned IP.

Someone, however has been trying to spoof and once or twice a day I get a bounce that goes like this:



This is the Postfix program at host smtp03.(our.isp)

I'm sorry to have to inform you that the message returned
below could not be delivered to one or more destinations.

For further assistance, please send mail to <postmaster>

If you do so, please include this problem report. You can
delete your own text from the message returned below.

The Postfix program

<michael@XXXX.com>: host mail.XXXX.com said: 550 5.1.1
<michael@XXXX.com>... User unknown (in reply to RCPT TO command)




XXXX = our domain. There is no "michael" account.



Reporting-MTA: dns; smtp03.(our isp)
Arrival-Date: Fri, 11 Jun 2004 04:49:49 -0500 (CDT)

Final-Recipient: rfc822; michael@XXXX.com
Action: failed
Status: 5.0.0
Diagnostic-Code: X-Postfix; host mail.xxxx.com said: 550 5.1.1
<michael@XXXX.com>... User unknown (in reply to RCPT TO command)


Subject:

Date:
Sat, 12 Jun 2004 15:36:35 +0600
From:
"Lesley Nash" <myaddy@XXXX.com>
To:
"Crisco" <myaddy@XXXX.com>

(spam message below)



Any ideas?
Printer Friendly | Permalink |  | Top
ET Awful Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 07:17 AM
Response to Original message
1. Sounds more like Trojan for virus activity to me . . . .
than anything else.

The only other possibility I can think of is that you have an open relay that hasn't been entirely blocked either on your firewall or on your mail server.

What you need to do is block outgoing mail from coming in through the firewall and being relayed.
Printer Friendly | Permalink |  | Top
 
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 07:28 AM
Response to Reply #1
2. there was a UCE in it
Edited on Fri Jun-11-04 07:30 AM by Crisco
for an insurance company.

side note: for the second time, I've had an outgoing message refused because our ISP is on the SPEWS list. I wouldn't be at all surprised if the people listed in the complaint are the same folks trying to use us as a relay.
Printer Friendly | Permalink |  | Top
 
ET Awful Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 07:32 AM
Response to Reply #2
3. That doesn't necessarily disprove the Trojan theory. . .
Edited on Fri Jun-11-04 07:33 AM by ET Awful
Some of the newer trojans are infecting private PC's, using them as relays and in turn using corporate mail server relays.

"Four-fifths of spam now emanates from computers contaminated with Trojan horse infections, according to a study by network management firm Sandvine out this week. Trojans and worms with backdoor components such as Migmaf and SoBig have turned infected Windows PCs into drones in vast networks of compromised zombie PCs.

Sandvine reckons junk mails created and routed by "spam Trojans" are clogging ISP mail servers, forcing unplanned network upgrades and stoking antagonism between large and small ISPs.

Using its own technology, Sandvine was able to identify subscribers bypassing their home mail servers and contacting many mail servers within a short period of time - a sure sign of spam Trojan activity - over sustained periods. It also looked at SMTP error messages returned, which helps to clarify the total volume of spam within the service provider network. "After comparing those data points with the total volume of legitimate messages passing through the service provider's mail system, we are able to arrive at our percentage of 80 per cent," explained Sandvine spokesman Mark De Wolf." . . . .

http://www.bankinfosecurity.com/?q=node/view/1286


I would double and triple check your firewall and server to make absolutely certain that no open relay exists.
Printer Friendly | Permalink |  | Top
 
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 07:35 AM
Response to Reply #3
4. thanks
..
Printer Friendly | Permalink |  | Top
 
Liberal Classic Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 07:48 AM
Response to Original message
5. Infected computer with a valid IP address?
There are numerous malicious programs that can hijack a machine without the user even being aware. They use a dictionary to pick random user names and recipients, so you never know if it is going to come from a valid user or not. Or you could have a spammer for a customer.

Postfix does stamp the numerical IP address in the header along with the host name. You should be able to track it down which customer by which address.

It is unlikely that they are trying to hack your server. Spammers work under the principle of the least work for the most reward. True computer cracking is difficult work. Spammers like easy things like poorly maintained email servers they can rape poorly written CGI scripts they can abuse.
Printer Friendly | Permalink |  | Top
 
Commie Pinko Dirtbag Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 08:00 AM
Response to Original message
6. The final destination of this spam was michael, one of you own customers
...that's why your Postfix accepted it.

But since the account doesn't exist (anymore?) Postfix sent a bounce to the (forged) envelope sender -- you.

About the origin, the best information you have is the first Recieved: header that list an untrusted address.
Printer Friendly | Permalink |  | Top
 
Commie Pinko Dirtbag Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 08:23 AM
Response to Original message
7. Another suggestion
Implement e-mail scanning on your mail server. Configure it to send notifications to an admin account whenever a virus is coming out of a customer's machine. Then you have a choice of actions -- I'd block the address and immediately contact the customer, maybe offering a repair job.

I also work for an ISP, and that's what we do. We use this tool (http://odeiavir.sourceforge.net), which is in process of being updated to include Exim support (unfortunately, it only works with Qmail and Exim right now). The author is a really cool guy. :evilgrin:

There's Amavis, but it uses Perl, and Perl is a tool of the Devil.
Printer Friendly | Permalink |  | Top
 
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jun-11-04 09:02 AM
Response to Reply #7
8. We Have That
we've been using Symantec but that's going to be replaced in the near future ... can't recall the name.. mojo? flofo?

the null emails with our domain on them that are showing up in these are all people who were with the company but left some 7-8 years ago. someone (obviously) got their hands on an old list.

Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 05:37 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC