> On Jul 6, 2016, at 1:21 PM, SH Development <listacco...@starionline.com> 
> wrote:
> 
> Here’s a strange one.  In my normal routine of glancing at the maillog file, 
> and subsequently the queue, I noticed several hundred emails queued up, all 
> with some bogus email variation on one of my domains.  So for instance:
> 
> abj...@mydomain.com
> lwoei...@mydomain.com
> 
> And so forth.
> 
> I traced it back to a particular IP address, and as a temporary stop-gap 
> measure, blocked that IP in the firewall and changed the passwords on the two 
> email addresses that use that domain.  The spam stopped.       

When I have seen this someone’s email password has been phished.

> 
> The strange thing is, that as soon as I unblock that one IP, it starts up 
> again.  I’m not sure how this one IP is managing to spoof email, and I am not 
> having any issues with any of my other 40 domains.  I can very clearly start 
> and stop the abuse by blocking the IP.
> 

What usually happens to me is that  when the spam starts again the first login 
of the spammer using the compromised address will show up. After the initial 
login I believe it keeps the connection open and continues to write to new 
emails using the bogus addresses 

> abj...@mydomain.com
> lwoei...@mydomain.com


> I’m not sure what I’m looking for, or how to find out how they are dumping 
> this spam on my server, I thought I had it locked down pretty well and I 
> haven’t had any problems for a couple of years until this week.
> 

I believe I usually grab the message id and search the logs for the submitter 
and eventually I can usual catch the initial login.

I’m no expert but that is how I cope with this. It has only happened twice.

Ben


> Jeff
> 
> 

Reply via email to