Re: OT: spammers are using my domain again

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2004-10-07 at 21:59, Trevor Smith wrote:
> So I'm getting tons of bounces because the spammers have made their way back 
> around to my personal domain and are sending out their crap with 
> <something>@haligonian.com as the forged From: address.
> 
> I don't really care since I have bogofilter installed and it puts every damn 
> one of them in my "unsure" folder and I never need to see them, but just to 
> be thorough...
> 
> Does anyone know of anything I could do to get them to move on from spoofing 
> my domain to spoofing the next victim's domain?
> 
> Is there any real harm to me that they are spoofing my domain, btw? I assume 
> that network admins are smart enough now that they realize almost all spam 
> addresses are spoofs and they don't go arbitrarily blacklisting poor suckers 
> like me. :-(
> 
> Now, I'm assuming this is straight forging, and that no spammers are actually 
> using any network resources related to me (since I pay $10/yr for a web/mail 
> hosting account for haligonian.com and don't run my own servers).
> 
> -- 
> Trevor Smith // trevor@xxxxxxxxxxxxxx

hi Trevor and everyone who is reading this.  
I haven't read the full thread, yet, but I want to relate my
"adventures" of the two days to you guys.  I run a hosting company that
has similar packages to what Trevor is getting.  

On Thursday I get the Logwatch come through plus I get nobodys mail for 
our virtual hosting servers and boom 150 returned emails from the
sending domain InternetBanking.com on one of them. Which we don't host
or have any records of what so ever.  So I know its spam.  Well after
searching form the subject matter with grep through out the home dirs of
each user.  Only one user had it but it was in his spam file.

Thats not enough to do anything about it but made us  watch this guy
closer all day exim was sending as nobody. Headers had nothing but the
hostname.  Started grepping through the mail logs for the time but
nothing came up.  Kept looking for the subject matter through out the
DBs and the whole system.  Only found it in the one spam file and
returned emails.  I also turned off mailman if that was the culprit
because he was running at times and we don't have any list on that
server.

I was stumped on Thursday trying to figure this out, my partners were
also.  Then on Friday it was still going on.  Server load wasn't jumping
and I couldn't take down the server because of the numerous accounts on
the server and lack of space on the other servers for them. 

But Friday I wake up to 2000 returned emails in my inbox from nobody at
this server.  Ok I then started to realize that it has to be a script
being ran from the web.  Yeah, I'm little slow sometimes call it tunnel
vision, should have realize that it was that when I saw nobody.  But I
then grepped the domlogs for the time the emails were being sent and
then also POST and then checked the suspect scripts by checking them
from the web.  I found it that way.

Its a simple script that is written in php and can use a DB to retrieve
the email info or you can manually enter it.  The recipients are a text
area you put an email into line by line.  It also has a text box for the
sending address and everything else and attempts to write the headers
also.  One of the emails from Friday had a sub dir that it used for the
source that was called in to me from an irate recipient of the email and
verified that it was this script.

Ok now that I found the target, my question was who was using that
script? I grepped for the scripts name in the domglogs and found only 2
IPs using that script mine and another.  That IP wasn't my customers but
someone elses.  It was a comcast IP, and nmap showed me it was a windows
box so I'm not going to say that that IP is the spammers but I'm
reporting it to comcast.  Could be the user of this computer is
compromised also.  But that IP accessed the script at the time the
emails were running. 

Also Friday only one file was upped using the ftp.  That was this script
from another hosting companies server.  He used two scripts with the
same code.  One called mailer.php in the root of the html dir and
services.php in a sub dir of that users html dir.  in the sub dir it was
easy to spot because it was the only php file in a sea of htm files. 
The mailer.php was in a sea of php files and harder to catch. 
mailer.php was used on Thursday and services.php was used on Friday.

All this was caused by one of two things.  My client shared his pw with
someone or it got cracked somewhere.  I still have to check the logs for
the IP to check to see if it was a brute force attack.  But it was a
weak password and I have reset it with something a little stronger.

Because of the nature of the email, its a phishing on asking for you to
reset your personal info for your bank. I'm going to be reporting this
to Interent Fraud Watch, the US FTC, comcast (I hear its a good luck if
they do anything) and the other hosting company that the file was
uploaded from.

Now I do have a question any one else I should notify about this?  I
don't want to email them I want to call this in and talk to someone.  So
phone numbers would be greatly appreciated to any groups or
organizations that would help in tracking this guy down?

TIA and I hope you enjoyed this.



Mike Ramirez <mike@xxxxxxxxxxxxxx>

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux