Solved

Sending out SPAM

Posted on 2014-11-25
6
60 Views
Last Modified: 2015-01-26
I have a customer that has just been blacklisted by 10 services for sending out SPAM.  We have ran Symantecs NPE (power erase) on all machines (35 or so) but CBL still states that SPAM is being sent out.

How can I attempt to detect the computer(s) sending the SPAM?
0
Comment
Question by:classnet
  • 3
  • 3
6 Comments
 
LVL 23

Expert Comment

by:NVIT
ID: 40465503
Does it show at http://cbl.abuseat.org?
Did you request to be removed?
0
 

Author Comment

by:classnet
ID: 40465514
It does show... don't want to remove it and still be sending SPAM as future removals are an issue.  Want to make sure we're clean.
0
 
LVL 23

Expert Comment

by:NVIT
ID: 40465528
Does NPE show a log you can review to find the offending computer(s)?
The CBL will continue to show until you request removal.

For added assurance, run additional scanners like Malwarebytes.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:classnet
ID: 40465537
NPE is ran on the computers and then displays things it believes is the issue.  You can then remove the things thought to be an issue.
0
 
LVL 23

Accepted Solution

by:
NVIT earned 500 total points
ID: 40569570
Hi classnet... Just wondering if you still need help with this or not. Either way, if you would close your question appropriately I'd really appreciate it.
0
 

Author Closing Comment

by:classnet
ID: 40570372
Sorry about the late response... we used NPE to clean the computer.  All seems well now.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

So you got the Conficker. You could go to each machine and run the eye chart test (http://www.confickerworkinggroup.org/infection_test/cfeyechart.html), but in a bigger environment, or if you prefer to work smarter and not harder, you need some …
Have you ever tried to find someone you know on Facebook and searched to find more than one result with the same picture? Perhaps someone you know has told you that they have a 'facebook stalker' or someone who is 'posing as them' online and ta…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now