?
Solved

Spam - Email getting through but not the person's name

Posted on 2006-06-26
2
Medium Priority
?
218 Views
Last Modified: 2010-04-11
We recently have installed Exchange 2003 as our email server ( had pop account prior). I need to install anti spam software and am in the process of getting that. My question is when spam comes in and is recieved in and individuals mailbox but it is not addressed to them - how is it getting there.

Example: mailbox name is peterf@domain.com but some of the mail received is yz@domain.com. How is it being routed there?
0
Comment
Question by:Pdeters
2 Comments
 
LVL 26

Accepted Solution

by:
Leon Fester earned 2000 total points
ID: 16984148
If the user has been added to a mailing list.. it would appears with the list and not as sent directly to the users.

It was common practise some time ago for spammers to create mailing list on yahoo/hotmail and then send mail to that email address. It would be received by the intended recipient, but the name that it was sent to would not be displayed.

Check the message header and see what you can find there...

It is also possible to test if the above is correctly by using the email address checker on www.dnsreport.com

goto www.dnsreport.com

enter the email address in the second textbox and it should then tell you if the mailbox exists on the mail server of the senders domain.
0
 

Author Comment

by:Pdeters
ID: 16985009
Thanks!
0

Featured Post

The eGuide to Automating Firewall Change Control

Today’s IT environment is constantly changing, which affects security policies and firewall rules. Discover tips to help you embrace this change through process improvement & identify areas where automation & actionable intelligence can enhance both security and business agility.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thin…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question