Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Machine compromised or email address being used for spam?

Posted on 2004-03-26
4
Medium Priority
?
216 Views
Last Modified: 2010-04-11
In the last week I have begun getting literally thousand of 'undeliverable message' emails on one of my machines. In looking at the header information it appears that the email account is being used to send out pornographic spam. The system has had up to date virus software and definitions and a firewall reunning all the time. When doing a virus scan the machine shows no infection and when running a spyware search I am finding very few bugs. When monitoring the machine I am showing no out of the ordinary activity, and there are no unusual services or apps running.
Is this a characteristic of a virus that has possibly disabled the virus software or is the email account possibly being spoofed by a spammer?
Thanks in advance for your assistance
0
Comment
Question by:GuitarG
2 Comments
 
LVL 32

Accepted Solution

by:
LucF earned 1000 total points
ID: 10687472
Hi GuitarG,

Yep, it looks like that computer is used to spam...
Use this tool and post the logfile:
 http://209.133.47.200/~merijn/files/HijackThis.exe

Greetings,

LucF
0
 
LVL 6

Assisted Solution

by:akboss
akboss earned 1000 total points
ID: 10696844
Yes it looks like you have been turned into a spam machine.
Do get that hijackthis file that LucF was talking about.

Also these 3 seem to clear out alot of the garbage out there.


Spybot
http://www.webattack.com/download/dlspybot.shtml 

http://www.safer-networking.org/

Ad-aware
 http://www.webattack.com/download/dladaware.shtml


CWShredder
 http://www.spywareinfo.com/~merijn/downloads.html

try one of the onlie scanners to look for viruses

Trend-Micro
http://housecall.trendmicro.com/ 

Symantec
http://security.symantec.com/

Mcafee
http://us.mcafee.com/root/mfs/default.asp

Panda
http://www.pandasoftware.com/activescan/com/activescan_principal.htm
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
Integration Management Part 2
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Suggested Courses

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question