Solved

Block Spoofed Emails

Posted on 2011-02-17
8
1,515 Views
Last Modified: 2012-05-11
Hi All,

I have a User who is being hit pretty hard with spoofed emails from somewhere every two minutes, using multiple spoofed (yet legitimate) email addresses.

We are using SBS 2008 and Trend Micro WFBS Advanced including the Inbound Email Security. To date I have just blocked based upon the email address, but this does not actually resolve the issue.

I assume I need to look at the Email Header to work out the IP and then block based upon that IP? The headers look pretty busy, so maybe there is a good tool I can use?
0
Comment
Question by:Flipp
  • 4
  • 3
8 Comments
 
LVL 6

Expert Comment

by:crash2000
ID: 34924595
HI,

That is a similar setup to the one we use on our clients and I would strongly recomend setting up your system to use Hosted Email security, which comes with your Trend WFBS.
This should help prevent these issues, plus many more. I can't rate this product any higher.
If you use the Active Directory Sync Client, it is really easy to keep all the correct email addresses up to date.

If you have any issues with it, let me know.

Mark
http://www.crash-2000.com
0
 
LVL 6

Author Comment

by:Flipp
ID: 34924895
I do already use Inbound Email Security, but the incoming emails are being sent to legitimate internal recipients, but the incoming email address (i.e. Sender) is spoofed. I would block on IP but not sure how to sort through all email headers.
0
 
LVL 6

Expert Comment

by:crash2000
ID: 34924939
Hi Flipp,

Yes I realise that but are you using Hosted Email Security too? That is the service where you direct all your email through Trend before it even arrives at the server. You use it by adjusting MX records etc.

You have would have a login here : https://emailsec.trendmicro.eu which is used to set it up.

Mark
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 6

Author Comment

by:Flipp
ID: 34924950
Yes I am using this service already.
0
 
LVL 6

Accepted Solution

by:
crash2000 earned 500 total points
ID: 34925049
Ah, Sorry. OK.
I am not aware of any tools. BUt perhaps someone else may advise. I presume you have tried chnaging the IP reputation and setting up a particular policy for that user.
I am suprised that Trend is letting those through. I presume you have removed any MX settings that point directly to your server and everything is going through Trends system.
I think my best advice would be to contact Trend and see if they can help.

Thanks
Mark
0
 
LVL 21

Expert Comment

by:Larry Struckmeyer MVP
ID: 34925137
ime spoofed bogus emails will stop in a few days.  Either Trend will figure it out, or the sender will move on to other targets to avoid being caught.  It is a real pain, and very annoying, but it should not last over a week at the most.  At least that has been my experience.

If any of the spoofed address are normal correspondents of your firm, I might contact them and suggest they looking an SPF record.
0
 
LVL 6

Author Closing Comment

by:Flipp
ID: 35048614
Cheers for your help.

Turns out that Trend needed create a pattern file to block these emails. After a few days it kicked in and I could remove the block I placed on email addresses and all is back to normal.
Another happy customer :)
0
 
LVL 6

Expert Comment

by:crash2000
ID: 35054875
Thanks for the feedback. always a pleasure to help.

Mark
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
This video discusses moving either the default database or any database to a new volume.

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question