Solved

Shadow messages are sent to un-intended user

Posted on 2004-09-08
13
202 Views
Last Modified: 2013-12-18
We have a situation in our office where a user is getting email not addressed to her.  I sent a message with a return receipt to another user, and I got two: one from the intended user, and one from the "spy".  The person receiving the non-intended email has access to the Lotus server in an administrative capacity.  Where do I start looking on the server/workstations(s) to find how this is being done?  Obviously I believe this to be intentional, but needs to get turned off.
0
Comment
Question by:luftmeister
  • 3
  • 2
  • 2
  • +2
13 Comments
 
LVL 24

Accepted Solution

by:
HemanthaKumar earned 168 total points
ID: 12006071
Check the mail db for any new mail agents.. probably that is trying to read/save the doc and might be causing the RR to be posted both from the user and signer of the agent ...

BTW, "SPY" will tell you the signer and look for specific user activity in the database

~Hemanth
0
 

Author Comment

by:luftmeister
ID: 12006199
Is there a specific mail agent that has the ability to intercept messages and send them to the spy?  I am unfamiliar with Lotus administration, how do I get to the mail DB?
0
 
LVL 14

Expert Comment

by:p_partha
ID: 12006230
PRobably ther eis a agent running in Mail.box which forwards the mail received from some 'User' to a 'SPY'. Check the mail.box for any scheduled agents

partha
0
 
LVL 6

Assisted Solution

by:tanelorn
tanelorn earned 166 total points
ID: 12006540
Hi
if someone looks at a mail message from the mail.box queue, and the return reciept bit is flipped, the "sender" will get a reciept from the client (user.id) that is looking at the documents in the queue. in this case,  your "spy"

so, all the person needs to do for this to happen is to poke around the mail.box database and open up documents.  I would imagine that there wouldn't be anything sinister unless all of the mail messages had attatchments...  or, as the others have pointed out,  an agent that is redirecting...  the text of the messages are not visible, but the attatchments can be looked at...

Tanelorn

0
 
LVL 6

Expert Comment

by:tanelorn
ID: 12006579
Hi again,

One thing that would disqualify my theory for your situation is if the "spy" is actually getting the mail in his/her mailbox.  if they are actually getting the mail, (which you alluded to, but didn't come out and say...)  then something else is going on...  but in your text  your proof was the return reciept...

Tanelorn
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 12006969
luftmeister,
We can assume that somebody is intercepting or genuinely an agent is written in the template and distributed by developer.. or there might be a change in the mail memo where cc or bcc is added specifically to a spy address and you are not aware.

So what you can do is send a mail trace and see what is happening. Check the delivery options , delivery report parameter
0
 

Author Comment

by:luftmeister
ID: 12007061
Thanks to all - I will be investigating this within the next few hours - and posting results.  I now have a starting point for this investigation!
0
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 12007081
Good Luck
0
 
LVL 31

Assisted Solution

by:qwaletee
qwaletee earned 166 total points
ID: 12008288
If the spy is "malicious," then this is what is PROBABLY happening.  He is opening the recipient's mail file, looking for interesting messages, and copying them to another database (probably a dummy local mail file or his own mail file) to read them.  It is also possible, but nlikely, that some code (an agent somewhere) copies the documents from the recipient to another file for this spy to read.

Here's why I say this.  If you get a document with RR request, Notes sends the RR as you open the document, then removes the RR request.  Otherwise, you would send a second RR if you opened the message later,  a second time, and so on.

So, there are only three reasons why a single message would generate two return receipts:

1) The message was actually mailed to multiple mailboxes, so multiple copies existed.

2) The first RR was generated by someone who had read-only access to the message.  Notes was unable to remove the RR request, so a seocnd person opening the message sent a second RR.

3) There are two copies of the message, which did not synchronize the RR removal with each other


#1 is normal if there is a group distribution, but you say there isn't.

#2 is unlikely for an administrator -- an admin with read only access?

Some version of #3 is most likely.  How could that come about?

3a) If there are two replicas, which have not replicated the RR removal form the first message copy into the second.  This is possible, but unlikely to occur on a regular basis.

3b) A perons copies the document, as a complete document (not a forwarded document) into another database.  That's what I would guess happened here.  A forwarded message doe snot carry the orignalting RR request with it.

3c) An automated process is doing the same as (3b).  That could exist in the intended recipient mail file, or completely independent of it.  Hard to tell.  You can try matching up the user activity history to agent manager log reports and other logged usage patterns.
0
 
LVL 31

Expert Comment

by:qwaletee
ID: 12844999
Woudl be nice if we nknew the result anyway, maybe luftmeister is still listening?
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

This is an old article, please see an updated version of this article, located here: http://www.experts-exchange.com/articles/23619/Notes-8-5x-Windows-7-Notes-info-and-tips.html
IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now