Solved

Exchange 2007 attack

Posted on 2013-12-09
4
283 Views
Last Modified: 2013-12-11
We have an Exchange 2007 server that runs on Windows 2003.  We have been getting failed login attempts on the server with generic user names like john, carol, support, administrator, admin and so on.  It's sometimes a few hundred every day.

The IP address is often different, as well as the source port.  The Logon type is always 10 and logon process User32.  We have Outlook Web Access enabled on this server, as well as POP3, IMAP4 and Exchange ActiveSync.  The server has a self-signed security certificate.

Our firewall is a Cisco ASA 5505.  I am trying to find out how they get to our server through the firewall and how this can be blocked.  I am not sure of this Exchange or Server 2003 related.

Below is an example of the many events from the security log on the server.

Event Type:      Failure Audit
Event Source:      Security
Event Category:      Logon/Logoff
Event ID:      529
Date:            12/9/2013
Time:            12:18:16 PM
User:            NT AUTHORITY\SYSTEM
Computer:      EXCHANGESERVER
Description:
Logon Failure:
       Reason:            Unknown user name or bad password
       User Name:      john
       Domain:            OURDOMAINNAME
       Logon Type:      10
       Logon Process:      User32  
       Authentication Package:      Negotiate
       Workstation Name:      EXCHANGESERVER
       Caller User Name:      EXCHANGESERVER$
       Caller Domain:      OURDOMAINNAME
       Caller Logon ID:      (0x0,0x3E7)
       Caller Process ID:      6948
       Transited Services:      -
       Source Network Address:      61.185.215.189
       Source Port:      56841
0
Comment
Question by:rwottowa
  • 2
  • 2
4 Comments
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 500 total points
ID: 39707408
As you have posted in your question the IP is coming from a Public IP source. I have used whatismyipaddress.com to look this IP up and it appears that 61.185.215.189 is a public IP from China.

This is more then likely an attempt to hack your system. You might want to check your firewall and see what services are open. If you have something like 3389 (rdp) or something open on your Exchange server this can create a security hold which will allow users to attempt access on your machines.

You can also use whatismyipaddress.com and put your own external IP address in there and it will discover what "services" are enabled.

Will.
0
 

Author Comment

by:rwottowa
ID: 39709960
Thanks Will, that was helpful.  I checked the firewall access rules and port 3389 was open to the email server.  It is disabled now so I'll monitor it closely and see if the attacks stop.

The IPs came from all over the world like Russia, China, Netherlands, USA and many more.   There really isn't a pattern to the origin of these attacks.
0
 
LVL 53

Expert Comment

by:Will Szymkowski
ID: 39709975
Something like this has happened to me before in other enviornments i have been exposed to. It is a huge security risk when you have 3389 opened to the outside world. I would think you should be fine now that it is being blocked by the firewall but i would monitor for the next couple of days.

Glad this helped your scenario.

Will.
0
 

Author Closing Comment

by:rwottowa
ID: 39712302
Closing 3389 (rdp) stopped the attacks right away and no new ones were recorded in the last 24 hours.  Thanks again!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now