Access was granted through delegated access - only the account owner has
direct access to the original account. 2FA is enabled, passwords are
changed regularly, and the network is secured by a firewall device that
monitors traffic and blocks unauthorized access attempts.

While it’s technically possible that someone gained access to the original
account, it’s highly unlikely they would have stopped at simply adding two
CNAME records and modifying the SPF for a less popular domain in the DNS -
removing the DMARC record entirely would have been a far easier and more
damaging move.

Given access to over 400 domains, the potential for more serious actions
would have been substantial.

Best,
Alex


On Thu, May 1, 2025 at 12:17 AM John Levine <jo...@taugh.com> wrote:

> It appears that Alex Shakhov | SH Consulting via mailop <a@sh.company>
> said:
> >DMARC p=reject. A follow-up review confirmed only two people (myself
> >included) had DNS access, ...
>
> How do you know that?  Have you reset the passwords and not told the other
> person for now to try and figure out where the leak is?
>
> Keep in mind it might not be deliberate, e.g. shoulder surfing or a lucky
> guessing attack.
>
> R's,
> John
>

-- 
*Over 2 million agents* are aiming for the inbox + mortgage, insurance, and 
legal folks too. *Spam filters work overtime*... Peek at your spam and 
imagine if all that landed in your inbox :D Getting through isn’t easy, but 
SH Consulting knows the smart moves. *Delivering 100 million+ real estate 
emails to inboxes* every month is solid proof, huh?
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to