spam with infected virus attachments

Posted on 2005-05-06
Last Modified: 2013-12-04
lately i have received a ton of spam that have the sober virus/worm

i do web site design and have a shared reseller web hosting account let's say my domain is just for reference. of course i never open up attachment from people i don't know. i have recevived and email with an attachement saying my username and password is attached. some of my client have received this email too. my client said it's from  me like They know all emails from me are the email address from line actually has my domain name but a bogus username. so does that mean my computer is infected and now is using my address book to email these people an emai that looks like it's from me?

I even received one of those bogus emails from one of my clients that said they received the bogus email from me. it had

what can i do? is my webhosting screwed up?
Question by:cmec
    LVL 10

    Accepted Solution

    It may be just the of your clients may have the worm and may have you in their address book so it may be using your domain name to make up a make believe address.  Or you could actually have it.  I would say scan your machine and take a look for the registry keys and files listed on this link.

    If there are others in your company that use your domain name also check their PCs.  If your clients are all at the same company then it may be someone in their company that has it and has your name in their address book.  Hard to tell....
    LVL 29

    Expert Comment

    "There is really no way to prevent receiving a spoofed email."

    Interesting rading:

    Spoofed/Forged Email

    Email Spoofing & Phishing

    LVL 29

    Expert Comment


    Of course, instead of rading, you can also try reading...

    LVL 32

    Expert Comment

    Yes, I agree with everyone above. When you receive an infected email with your name as the return address, about the only thing you can be sure of is that it did not come from you!

    You could try deciphering the mail headers and that will at least tell you what IP the mail originated from, in most cases.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
    No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now