My thinking is somewhat related to a thread on this list back in Oct 2017 (Subject: Slow botnet IMAP scans).

I've begun to observe IMAP searches initiated by our clients. We experienced a DoS type of event some months ago against IMAP and it was clear resource exhaustion related to IMAP search was the culprit.

Have other email sysadmin types here observed what looks like badguy activity within mailboxes suspected to be compromised? The suspicion is raised looking at accounts used to relay spam via SMTP AUTH, as well as the source IPs for the SMTP and IMAP activities.

Based on my observations there's a few trends in the searches which have emerged:

1) the search string is rarely, if ever, nested, nor has multiple conditions
2) the search string does not include "NOT DELETED" or "UNDELETED" and therefore includes \Deleted messages
3) the search within BODY or FROM
4) The searches are for domains or @domains where the domain is usually a service provider type of account (Steam, Blizzard, porn sites) or financially related (Paypal, payment processing services, cryptocurrencies) 5) timing of consecutive searches for different strings is "impossibly quick" for a human 6) (This one is less consistent) Often the IMAP client ID (RFC 2971) is "Mail.dll", some dot.net library for all things email.

It seems fairly obvious why the badguys are doing this; a pwned mailbox has all kinds of value in the realm of theft, identity or otherwise.

I'm curious if anyone else is observing this and if there are other bits of telemetry you are looking for.




_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to