On 2/18/2016 7:19 PM, James B. Byrne wrote:
> 
> One of our staff had their email account compromised. We have changed
> that user's login and password.  However I lack experience
> interpreting what happened.  Would someone take a look at the
> following headers and tell me how this was done?  I can make a
> reasonable guess but I would like a definitive answer.
> 
> This is a representative header from one of the messages relayed:
> 
> <---
> 
> Received      from localhost (localhost [127.0.0.1]) by
> inet08.hamilton.harte-lyne.ca (Postfix) with ESMTP id 3137662492; Tue,
> 16 Feb 2016 09:44:30 -0500 (EST)
> 
> X-Virus-Scanned       amavisd-new at harte-lyne.ca
> 
> Received      from inet08.hamilton.harte-lyne.ca ([127.0.0.1]) by
> localhost (inet08.hamilton.harte-lyne.ca [127.0.0.1]) (amavisd-new,
> port 10024) with ESMTP id YweOTfrrhigz; Tue, 16 Feb 2016 09:44:28
> -0500 (EST)

The headers above this appear to be normal passing through your
content_filter.

> 
> Received      from [127.0.0.1] (ppp-171-96-116-78.revip8.asianet.co.th
> [171.96.116.78]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256
> bits)) (Client did not present a certificate) by
> inet08.hamilton.harte-lyne.ca (Postfix) with ESMTPSA id 4B48362499;
> Tue, 16 Feb 2016 09:44:07 -0500 (EST)

Here's where the mail entered your system.  The attacker had the
user's sasl credentials.  The attacker connected from IP
171.96.116.78 using a HELO hostname of [127.0.0.1].

As for how the attacker got the user's credentials, likely either
they were phished or they reused a password from some other site
that was hacked.  The user should consider that password compromised
and never use it again for anything.



  -- Noel Jones

Reply via email to