On 07/06/2016 01:35 PM, Ben Greenfield wrote:

On Jul 6, 2016, at 1:21 PM, SH Development <listacco...@starionline.com> wrote:

Here’s a strange one.  In my normal routine of glancing at the maillog file, 
and subsequently the queue, I noticed several hundred emails queued up, all 
with some bogus email variation on one of my domains.  So for instance:

abj...@mydomain.com
lwoei...@mydomain.com

And so forth.

I traced it back to a particular IP address, and as a temporary stop-gap 
measure, blocked that IP in the firewall and changed the passwords on the two 
email addresses that use that domain.  The spam stopped. 

When I have seen this someone’s email password has been phished.

See my previous response to Michael Fox on how to lock down authenticated senders to a canonical envelope sender. This will prevent the rotating forged local addresses, and make it much easier to see which account has been compromised in the process. Then it's simply a matter of disabling the account.

The account can be found in the logs as well, but is there any need for your own senders to arbitrarily forge email from your domain?

Mike

--
Michael D. Sofka               sof...@rpi.edu
C&MT Sr. Systems Programmer,   Email, TeX, Epistemology
Rensselaer Polytechnic Institute, Troy, NY.  http://www.rpi.edu/~sofkam/

Reply via email to