Solved

Bogus helo

Posted on 2006-11-07
4
1,144 Views
Last Modified: 2007-12-19
I am recieving this bounce back message. I run an inhouse exchange server. Can someone tell me what it means and how to repair it?

Your message did not reach some or all of the intended recipients.

      Subject:  FW: bounced back email..

      Sent:     11/7/2006 10:35 AM


The following recipient(s) could not be reached:

      Christian Wigley on 11/7/2006 10:35 AM

            There was a SMTP communication problem with the recipient's email server.  Please contact your system administrator.

            <caledclean.com #5.5.0 smtp;553 Bogus helo vu1a.heiue9o.aol.com. <http://unblock.secureserver.net/?ip=209.xxx.xxx.xxx>>
0
Comment
Question by:zwig2002
4 Comments
 
LVL 15

Accepted Solution

by:
davidis99 earned 500 total points
ID: 17898442
If the antivirus on your desktops and servers are up to date and your systems are virus and spyware free, most likely this is being cause by a third party who's been in contact with someone at your firm, and that third party has been infected with one of several viruses that has its own mass mailing engine, where it harvests addresses from a local address book, then sends infected email from one address book recipient to another.  If this happens, and an address book has out of date email addresses, the mail server receiving the bogus email will send a bounce back message to the server it appears the mail came from (yours.)   About the only thing you can do, if this is the case, is check all your internal PCs for viruses, and ask the users to make sure their external contacts are running up to date antivirus software and have checked their PCs for viruses.
0
 

Author Comment

by:zwig2002
ID: 17898537
I have found the virus. It was on one of my mobile users laptop.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
This guide will walk you through the essential considerations and tech stack for building scalable websites. Know how to grow your business the smart way!
This video will demonstrate how to find the puppet warp tool from the edit menu and where to put the points to edit.
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now