Solved

Exchange 2010 Email Address Spamming

Posted on 2014-02-19
7
602 Views
Last Modified: 2014-02-21
Hi, yesterday we found that a domain user was receiving "Undeliverable" emails in her inbox, 5000 of them about. We use a Cisco IronPort device to filter and found that her email address had sent 33k emails during the day yesterday. I worked with Cisco to adjust our outgoing policy to state that if any emails are scanned as spam or a threat, drop them. It was set to deliver them...

Cisco stated that the emails are still being sent from our mail server, so i need to find out how. I tried with doing a "get-messagetrackinglog" with the header of a spam email and it tells me the sender (which i already knew). How do i stop exchange from sending on behalf of this user, what could it be? any tips on this are greatly appreciated.

thanks
0
Comment
Question by:ArtiePublic
7 Comments
 
LVL 5

Expert Comment

by:arjunvyavahare
ID: 39872512
If you know the sender then can you go to his machine and perform Antivirus scan and also meantime can you remove that user's machine from the network for a while and monitor outgoing email traffic? This may resolve your issue.
0
 
LVL 63

Accepted Solution

by:
Simon Butler (Sembee) earned 500 total points
ID: 39872629
It probably isn't anything with the workstation.
Is the server exposed to the internet? If so, then the user probably responded to a phishing email, or has used an easily guessed password and the spammer has simply bounced the emails off your server using their credentials.

While malware on a workstation is pretty common for sending spam, in almost all cases the malware will have its own SMTP engine, rather than depending on a mail client already configured. To use your email server means the malware writer has to find the server, create the messages, pass them through Outlook and hope that you don't spot them. It is much easier and less work to just have their own SMTP engine to send the email out directly, which is easily blocked - hence my suspicion that the emails actually came from outside with the user's credentials.

Simon.
0
 

Author Comment

by:ArtiePublic
ID: 39873933
Hi Simon, your exactly right. I did do the steps though above prior to what he stated, but how do you suggest i go about finding this smtp engine?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 63

Expert Comment

by:Simon Butler (Sembee)
ID: 39875296
First you should have port 25 blocked at the firewall for everything but the Exchange server. If you get an infected machine it will show in the logs very quickly.

That will allow you to identify which machine has the malware. Then I would find it and wipe it. If it belongs to the user in question then it will teach them a lesson about responding to phishing or using simple passwords. While you can run malware detection tools, malware is a moving beast and you cannot guarantee that you have removed it all.

Simon.
0
 

Author Comment

by:ArtiePublic
ID: 39875300
Port 25 is blocked for sure. What logs do you mean, the header info in the email or exchange event viewer logs? Yes, i removed the machine and so far so good but like you said it might have moved on to someone else.
0
 
LVL 16

Expert Comment

by:Enphyniti
ID: 39876057
To clarify - Simon is suggesting you block port 25 outbound for all but the exchange server.  If you've done that, then the theoretical local smtp engine on the compromised system can no longer send email.

If in fact, the mail is flowing via authentication through your mailserver, then you should be able to review outbound messages using the tracking log explorer.

Or, if your user is willing, setup a transport rule on the HT server that redirects all of their sent mail to a local mailbox.  If a bunch of spam shows up, then you know the account is compromised.

At any rate, you should change the password soonest.
0
 

Author Comment

by:ArtiePublic
ID: 39877236
Right, the password for the user has been changed. Its been two days now and i dont have anymore spam messages generating. Im going to assume this is gone or at least stopped by me restricting port 25 for outbound, as well as updating my outgoing policy on my Ironport. Thank you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Read this checklist to learn more about the 15 things you should never include in an email signature.
In this video we show how to create an Accepted Domain in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Ac…
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now