Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 618
  • Last Modified:

Exchange 2010 Email Address Spamming

Hi, yesterday we found that a domain user was receiving "Undeliverable" emails in her inbox, 5000 of them about. We use a Cisco IronPort device to filter and found that her email address had sent 33k emails during the day yesterday. I worked with Cisco to adjust our outgoing policy to state that if any emails are scanned as spam or a threat, drop them. It was set to deliver them...

Cisco stated that the emails are still being sent from our mail server, so i need to find out how. I tried with doing a "get-messagetrackinglog" with the header of a spam email and it tells me the sender (which i already knew). How do i stop exchange from sending on behalf of this user, what could it be? any tips on this are greatly appreciated.

thanks
0
ArtiePublic
Asked:
ArtiePublic
1 Solution
 
Arjun VyavahareTechnical ConsultantCommented:
If you know the sender then can you go to his machine and perform Antivirus scan and also meantime can you remove that user's machine from the network for a while and monitor outgoing email traffic? This may resolve your issue.
0
 
Simon Butler (Sembee)ConsultantCommented:
It probably isn't anything with the workstation.
Is the server exposed to the internet? If so, then the user probably responded to a phishing email, or has used an easily guessed password and the spammer has simply bounced the emails off your server using their credentials.

While malware on a workstation is pretty common for sending spam, in almost all cases the malware will have its own SMTP engine, rather than depending on a mail client already configured. To use your email server means the malware writer has to find the server, create the messages, pass them through Outlook and hope that you don't spot them. It is much easier and less work to just have their own SMTP engine to send the email out directly, which is easily blocked - hence my suspicion that the emails actually came from outside with the user's credentials.

Simon.
0
 
ArtiePublicAuthor Commented:
Hi Simon, your exactly right. I did do the steps though above prior to what he stated, but how do you suggest i go about finding this smtp engine?
0
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

 
Simon Butler (Sembee)ConsultantCommented:
First you should have port 25 blocked at the firewall for everything but the Exchange server. If you get an infected machine it will show in the logs very quickly.

That will allow you to identify which machine has the malware. Then I would find it and wipe it. If it belongs to the user in question then it will teach them a lesson about responding to phishing or using simple passwords. While you can run malware detection tools, malware is a moving beast and you cannot guarantee that you have removed it all.

Simon.
0
 
ArtiePublicAuthor Commented:
Port 25 is blocked for sure. What logs do you mean, the header info in the email or exchange event viewer logs? Yes, i removed the machine and so far so good but like you said it might have moved on to someone else.
0
 
Jon BrelieSystem ArchitectCommented:
To clarify - Simon is suggesting you block port 25 outbound for all but the exchange server.  If you've done that, then the theoretical local smtp engine on the compromised system can no longer send email.

If in fact, the mail is flowing via authentication through your mailserver, then you should be able to review outbound messages using the tracking log explorer.

Or, if your user is willing, setup a transport rule on the HT server that redirects all of their sent mail to a local mailbox.  If a bunch of spam shows up, then you know the account is compromised.

At any rate, you should change the password soonest.
0
 
ArtiePublicAuthor Commented:
Right, the password for the user has been changed. Its been two days now and i dont have anymore spam messages generating. Im going to assume this is gone or at least stopped by me restricting port 25 for outbound, as well as updating my outgoing policy on my Ironport. Thank you.
0

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now