Solved

Machine compromised or email address being used for spam?

Posted on 2004-03-26
4
196 Views
Last Modified: 2010-04-11
In the last week I have begun getting literally thousand of 'undeliverable message' emails on one of my machines. In looking at the header information it appears that the email account is being used to send out pornographic spam. The system has had up to date virus software and definitions and a firewall reunning all the time. When doing a virus scan the machine shows no infection and when running a spyware search I am finding very few bugs. When monitoring the machine I am showing no out of the ordinary activity, and there are no unusual services or apps running.
Is this a characteristic of a virus that has possibly disabled the virus software or is the email account possibly being spoofed by a spammer?
Thanks in advance for your assistance
0
Comment
Question by:GuitarG
4 Comments
 
LVL 32

Accepted Solution

by:
Luc Franken earned 250 total points
Comment Utility
Hi GuitarG,

Yep, it looks like that computer is used to spam...
Use this tool and post the logfile:
 http://209.133.47.200/~merijn/files/HijackThis.exe

Greetings,

LucF
0
 
LVL 6

Assisted Solution

by:akboss
akboss earned 250 total points
Comment Utility
Yes it looks like you have been turned into a spam machine.
Do get that hijackthis file that LucF was talking about.

Also these 3 seem to clear out alot of the garbage out there.


Spybot
http://www.webattack.com/download/dlspybot.shtml

http://www.safer-networking.org/

Ad-aware
 http://www.webattack.com/download/dladaware.shtml


CWShredder
 http://www.spywareinfo.com/~merijn/downloads.html

try one of the onlie scanners to look for viruses

Trend-Micro
http://housecall.trendmicro.com/

Symantec
http://security.symantec.com/

Mcafee
http://us.mcafee.com/root/mfs/default.asp

Panda
http://www.pandasoftware.com/activescan/com/activescan_principal.htm
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Read about achieving the basic levels of HRIS security in the workplace.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now