Jer
asked on
Spam Attack - Exchange 2010
Greetings,
A few days ago, we had an email attack that resulted in hundreds of emails being sent (or attempted to be sent) through our Exchange 2010 server and our ZixGateway secure email appliance. Fortunately, most emails appear to have been held in queue on your Zix appliance, preventing delivery and allowing us to avoid being blacklisted. Unfortunately, I'm the only network admin and I was on PTO at the time of the attack. Even more unfortunate, my company has yet to approve any syslog solution, much less a SIEM product. So, information available to me is somewhat limited. The thing that seem to stop the attack was changing the network password of the impacted user. This really concerns me, as the user is a domain admin. Anyhow, in the Exchange logs, I have found several examples similar to the following:
2017-04-20T15:42:25.101Z,1 62.246.25. 243,[10.0. 0.7],192.1 68.1.125,E mailServer 01,08D46E4 C20583FF6; 2017-04-20 T15:38:52. 419Z;0,Ema ilServer01 \Client EmailServer01,SMTP,RECEIVE ,7906989,< 166B4AF1-5 FD1-7A40-8 DF5-73A7A4 9B6C37@dom ain1.com>, tsummerr@g mail.com,, 3265,1,,,H ello tatiana !,user1@domain1.com,user1@ domain1.co m,06I: NTS: ,Originating,,162.246.25.2 43,192.168 .1.125,S:F irstForest Hop=EmailS erver01.do main1.com
2017-04-20T15:42:25.164Z,1 92.168.1.1 29,EmailSe rver01,192 .168.1.128 ,smarthost .domain1.c om,08D46E4 C20584263; 250 2.0.0 Ok: queued as C2989301D66,Zix Mail Send Connector,SMTP,SEND,790698 9,<166B4AF 1-5FD1-7A4 0-8DF5-73A 7A49B6C37@ domain1.co m>,tsummer r@gmail.co m,250 2.1.5 Ok,4171,1,,,Hello tatiana !,user1@domain1.com,user1@ domain1.co m,2017-04- 20T15:42:2 4.493Z;SRV =EmailServ er01.domai n1.com:TOT AL=0,Origi nating,,,,
2017-04-20T15:42:26.428Z,1 62.246.25. 243,[10.0. 0.7],192.1 68.1.125,E mailServer 01,08D46E4 C20583FF6; 2017-04-20 T15:38:52. 419Z;0,Ema ilServer01 \Client EmailServer01,SMTP,RECEIVE ,7906990,< 243B183E-0 6D5-F898-4 721-CB8FD7 7FB964@dom ain1.com>, brinks0610 @gmail.com ,,3234,1,, ,Good day ryan _,user1@domain1.com,user1@ domain1.co m,06I: NTS: ,Originating,,162.246.25.2 43,192.168 .1.125,S:F irstForest Hop=EmailS erver01.do main1.com
2017-04-20T15:42:26.490Z,1 92.168.1.1 29,EmailSe rver01,192 .168.1.128 ,smarthost .domain1.c om,08D46E4 C20584265; 250 2.0.0 Ok: queued as 1E3FF301D66,Zix Mail Send Connector,SMTP,SEND,790699 0,<243B183 E-06D5-F89 8-4721-CB8 FD77FB964@ domain1.co m>,brinks0 610@gmail. com,250 2.1.5 Ok,4162,1,,,Good day ryan _,user1@domain1.com,user1@ domain1.co m,2017-04- 20T15:42:2 5.882Z;SRV =EmailServ er01.domai n1.com:TOT AL=0,Origi nating,,,,
2017-04-20T15:42:27.754Z,1 62.246.25. 243,[10.0. 0.7],192.1 68.1.125,E mailServer 01,08D46E4 C20583FF6; 2017-04-20 T15:38:52. 419Z;0,Ema ilServer01 \Client EmailServer01,SMTP,RECEIVE ,7906991,< F8FD26EE-3 C0F-E8C2-B F2F-1AC549 CC6128@dom ain1.com>, johannahro driguez@ya hoo.com,,3 298,1,,,Hi johannah .,user1@domain1.com,user1@ domain1.co m,06I: NTS: ,Originating,,162.246.25.2 43,192.168 .1.125,S:F irstForest Hop=EmailS erver01.do main1.com
2017-04-20T15:42:27.816Z,1 92.168.1.1 29,EmailSe rver01,192 .168.1.128 ,smarthost .domain1.c om,08D46E4 C2058426A; 250 2.0.0 Ok: queued as 6E181301D66,Zix Mail Send Connector,SMTP,SEND,790699 1,<F8FD26E E-3C0F-E8C 2-BF2F-1AC 549CC6128@ domain1.co m>,johanna hrodriguez @yahoo.com ,250 2.1.5 Ok,4204,1,,,Hi johannah .,user1@domain1.com,user1@ domain1.co m,2017-04- 20T15:42:2 7.208Z;SRV =EmailServ er01.domai n1.com:TOT AL=0,Origi nating,,,,
What I'm trying to figure out is the method of the attack and the source. We don't allow relaying. I have very limited firewall (SonicWALL router) logs and no Security logs from any server. I suspect that this is a relaying attack (from several IP addresses), but it could also be a compromised device within our network. Unfortunately, without Security logs, it seems pretty tough to confirm much.
As such, I'm hoping that someone out there can help shed some light on what I should do and look for. I'm not comfortable at all with simply changing a password.
I appreciate any assistance.
Thank you,
Jeremy
A few days ago, we had an email attack that resulted in hundreds of emails being sent (or attempted to be sent) through our Exchange 2010 server and our ZixGateway secure email appliance. Fortunately, most emails appear to have been held in queue on your Zix appliance, preventing delivery and allowing us to avoid being blacklisted. Unfortunately, I'm the only network admin and I was on PTO at the time of the attack. Even more unfortunate, my company has yet to approve any syslog solution, much less a SIEM product. So, information available to me is somewhat limited. The thing that seem to stop the attack was changing the network password of the impacted user. This really concerns me, as the user is a domain admin. Anyhow, in the Exchange logs, I have found several examples similar to the following:
2017-04-20T15:42:25.101Z,1
2017-04-20T15:42:25.164Z,1
2017-04-20T15:42:26.428Z,1
2017-04-20T15:42:26.490Z,1
2017-04-20T15:42:27.754Z,1
2017-04-20T15:42:27.816Z,1
What I'm trying to figure out is the method of the attack and the source. We don't allow relaying. I have very limited firewall (SonicWALL router) logs and no Security logs from any server. I suspect that this is a relaying attack (from several IP addresses), but it could also be a compromised device within our network. Unfortunately, without Security logs, it seems pretty tough to confirm much.
As such, I'm hoping that someone out there can help shed some light on what I should do and look for. I'm not comfortable at all with simply changing a password.
I appreciate any assistance.
Thank you,
Jeremy
ASKER
The 192.168.1.x addresses listed are my email server and the smart host. I've checked for incoming SMTP traffic and haven't seen anything out of the ordinary. All legit machines have updated AV. With the password change, I'd have expected to see lockouts or failed logins on my DCs and my Exchange server. I don't see any of that. Granted, it may have been there on April 20th, but there hasn't been anything since I started looking into it (April 25).
Jeremy
Jeremy
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
If a user account has their credentials compromised, authenticated relay is a possibility, even if you don't allow anonymous relay. Exchange includes an Authenticated SMTP relay connector that uses port 587 to send email. This is provided so users can send email when using IMAP or POP3. If you don't have any users that use either of those, you can disable the receive connector that allows authenticated relay to prevent this type of attack from succeeding. Just look through your Exchange servers' receive connectors and disable/delete any that are running on port 587 and authenticated relay will be disabled. Not, also, that if you do this network devices won't be able to use Exchange for SMTP relaying in any way. You may still have SMTP logs for that connector that could help you determine if this is what happened, though, since that connector isn't regularly used, most of the time.
As an aside, if you need to use Exchange to allow network devices to send email to internal users only, you can use the "Direct send" method, which involves sending unauthenticated mail on port 25 to the Exchange server. You can only send to internal users with this method, and you have to allow it through any spam filters/connection filters you have set up in Exchange.
As an aside, if you need to use Exchange to allow network devices to send email to internal users only, you can use the "Direct send" method, which involves sending unauthenticated mail on port 25 to the Exchange server. You can only send to internal users with this method, and you have to allow it through any spam filters/connection filters you have set up in Exchange.
The thing that seem to stop the attack was changing the network password of the impacted user. This really concerns me, as the user is a domain admin.
That tells me that this was most likely through webmail. However, if there is RDP access to the person's computer, that is the other possibility.
I would make 3 suggestions:
1) Review the password complexity rules in your domain
2) Consider creating separate admin accounts for those who do admin work. That way, you'll know that there is a separation, and that users should not be using them for regular things.
3) Review remote access mechanisms
ASKER
Thanks for all the responses. There were no traces of the emails in the users Sent Items. She actually was receiving the rejection emails from our smart host, which allowed her to know that something was wrong. We do have solid complexity rules for passwords. Of course, that doesn't mean they can't be identified. We're actually working to separate admin accounts from the actual users, limiting risk and impact. I'll need to check into my receive connectors more, regarding port 587. Off the top of my head, it seems like we need that for our Zix email environment, but I could be wrong, Definitely gives me something to research.
Thanks,
Jeremy
Thanks,
Jeremy
Do you have any sort of message headers? The messages had to come to the smart host from somewhere. Besides, if someone is going to use someone else's account to send email, they're not really going to leave traces in the Sent folder (that's a dead giveaway). If you use the Exchange console, are you able to do any message tracking?
ASKER
The header info of the rejection messages didn't appear to be anymore informational than the messagetracking logs listed above. Here is an example (the internal "from" address is not valid in our environment":
Delivery has failed to these recipients or groups:
iburge@cogeco.ca
A problem occurred during the delivery of this message to this e-mail address. Try sending this message again. If the problem continues, please contact your helpdesk.
The following organization rejected your message: mx.cogeco.ca.
Diagnostic information for administrators:
Generating server: Smarthost01.domain1.com
iburge@cogeco.ca
mx.cogeco.ca #<mx.cogeco.ca #5.0.0 smtp; 550 #5.1.0 Address rejected.> #SMTP#
Original message headers:
Return-Path: <user1@domain1.com>
Received: from 127.0.0.1 (ZixVPM [127.0.0.1])
by Outbound.domain1.com (Proprietary) with SMTP id CBE31301FFA
for <iburge@cogeco.ca>; Thu, 20 Apr 2017 10:29:51 -0500 (CDT)
Received: by Smarthost01.domain1.com (Proprietary, from userid 89)
id B6AF6301F12; Thu, 20 Apr 2017 10:29:01 -0500 (CDT)
Received: from 127.0.0.1 (ZixVPM [127.0.0.1])
by Outbound.domain1.com (Proprietary) with SMTP id B8A64301FFA
for <iburge@cogeco.ca>; Thu, 20 Apr 2017 10:28:13 -0500 (CDT)
Received: from EmailServer01.domain1.com (smtp.domain1.com [192.168.1.129])
(using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested)
by Smarthost01.domain1.com (Proprietary) with ESMTPS id 6F568301E77
for <iburge@cogeco.ca>; Thu, 20 Apr 2017 10:28:13 -0500 (CDT)
Received: from [10.0.0.4] (78.20.85.83) by mail.domain1.com
(192.168.1.125) with Microsoft SMTP Server (TLS) id 14.3.319.2; Thu, 20 Apr
2017 10:28:13 -0500
Message-ID: <366809D9612E2FDA7A50F6FEA F26DDE1@19 2.168.1.64 >
Reply-To: Andre Williams <hiring@recruitment-cf.com >
From: Andre Williams <user1@domain1.com>
To: <iburge@cogeco.ca>
Subject: new post available: insurance claims executive
Date: Thu, 20 Apr 2017 16:15:57 -0700
MIME-Version: 1.0
Content-Type: text/plain; format=flowed; charset="utf-8"; reply-type=original
X-Priority: 3
X-MSMail-Priority: Normal
Importance: Normal
X-Mailer: Microsoft Windows Live Mail 16.4.3505.912
X-MimeOLE: Produced By Microsoft MimeOLE V16.4.3505.912
Content-Transfer-Encoding: quoted-printable
X-TM-AS-Product-Ver: SMEX-12.0.0.1350-8.100.106 2-23018.00 6
X-TM-AS-Result: Yes-26.002300-5.000000-31
X-TM-AS-MatchedID: 702020-121132-700752-86049 3-118325-7 00242-1131 23-710078- 7
00927-707997-702762-701229 -705388-11 0277-70545 0-110082-1 10083-7006 18-701573
-704775-703223-700445-7011 42-700491- 709584-863 299-707800 -105020-70 3041-7100
96-703829-703788-113898-70 0706-11404 1-702643-7 10062-7007 16-701275- 190748-14
8004-148133-148149-148151- 42000-4200 3
X-TM-AS-User-Approved-Send er: No
X-TM-AS-User-Blocked-Sende r: No
X-VPM-MSG-ID: f9175af3-1f67-488b-af75-99 e2ea985747
X-VPM-HOST: Smarthost01.domain1.com
X-VPM-GROUP-ID: 858ca9f8-67ae-4028-af93-21 04bf332a46
X-VPM-ENC-REGIME: TLS,Plaintext
X-VPM-IS-HYBRID: 0
CC:
Delivery has failed to these recipients or groups:
iburge@cogeco.ca
A problem occurred during the delivery of this message to this e-mail address. Try sending this message again. If the problem continues, please contact your helpdesk.
The following organization rejected your message: mx.cogeco.ca.
Diagnostic information for administrators:
Generating server: Smarthost01.domain1.com
iburge@cogeco.ca
mx.cogeco.ca #<mx.cogeco.ca #5.0.0 smtp; 550 #5.1.0 Address rejected.> #SMTP#
Original message headers:
Return-Path: <user1@domain1.com>
Received: from 127.0.0.1 (ZixVPM [127.0.0.1])
by Outbound.domain1.com (Proprietary) with SMTP id CBE31301FFA
for <iburge@cogeco.ca>; Thu, 20 Apr 2017 10:29:51 -0500 (CDT)
Received: by Smarthost01.domain1.com (Proprietary, from userid 89)
id B6AF6301F12; Thu, 20 Apr 2017 10:29:01 -0500 (CDT)
Received: from 127.0.0.1 (ZixVPM [127.0.0.1])
by Outbound.domain1.com (Proprietary) with SMTP id B8A64301FFA
for <iburge@cogeco.ca>; Thu, 20 Apr 2017 10:28:13 -0500 (CDT)
Received: from EmailServer01.domain1.com (smtp.domain1.com [192.168.1.129])
(using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested)
by Smarthost01.domain1.com (Proprietary) with ESMTPS id 6F568301E77
for <iburge@cogeco.ca>; Thu, 20 Apr 2017 10:28:13 -0500 (CDT)
Received: from [10.0.0.4] (78.20.85.83) by mail.domain1.com
(192.168.1.125) with Microsoft SMTP Server (TLS) id 14.3.319.2; Thu, 20 Apr
2017 10:28:13 -0500
Message-ID: <366809D9612E2FDA7A50F6FEA
Reply-To: Andre Williams <hiring@recruitment-cf.com
From: Andre Williams <user1@domain1.com>
To: <iburge@cogeco.ca>
Subject: new post available: insurance claims executive
Date: Thu, 20 Apr 2017 16:15:57 -0700
MIME-Version: 1.0
Content-Type: text/plain; format=flowed; charset="utf-8"; reply-type=original
X-Priority: 3
X-MSMail-Priority: Normal
Importance: Normal
X-Mailer: Microsoft Windows Live Mail 16.4.3505.912
X-MimeOLE: Produced By Microsoft MimeOLE V16.4.3505.912
Content-Transfer-Encoding:
X-TM-AS-Product-Ver: SMEX-12.0.0.1350-8.100.106
X-TM-AS-Result: Yes-26.002300-5.000000-31
X-TM-AS-MatchedID: 702020-121132-700752-86049
00927-707997-702762-701229
-704775-703223-700445-7011
96-703829-703788-113898-70
8004-148133-148149-148151-
X-TM-AS-User-Approved-Send
X-TM-AS-User-Blocked-Sende
X-VPM-MSG-ID: f9175af3-1f67-488b-af75-99
X-VPM-HOST: Smarthost01.domain1.com
X-VPM-GROUP-ID: 858ca9f8-67ae-4028-af93-21
X-VPM-ENC-REGIME: TLS,Plaintext
X-VPM-IS-HYBRID: 0
CC:
I was wondering about this earlier. Is it possible the original messages did not come from your domain? The spammer is impersonating your user. Thus if they send to an address that doesn't exist, the NDR notices comes to your server.
That kind of error occurs because the recipient server (mx.cogeco.ca in your example) is not checking to see if the sender is authorized to send as your domain.
Normally this is prevented by the mail gateway checking to see if the address exists *before* accepting the message. If it rejects the message due to an incorrect address then it's up to the senders server to inform the sender. Thus the message never gets to your mail server.
That kind of error occurs because the recipient server (mx.cogeco.ca in your example) is not checking to see if the sender is authorized to send as your domain.
Normally this is prevented by the mail gateway checking to see if the address exists *before* accepting the message. If it rejects the message due to an incorrect address then it's up to the senders server to inform the sender. Thus the message never gets to your mail server.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Our smart host held the emails in queue, so they definitely originated from my Exchange server. I've gone through the EMC and every log file on the Exchange server. What I've posted is all that I have found to be pertinent. I do have a Client Receive Connector that uses port 587 for all addresses with the only permission group of Exchange users. If I'm understanding correctly, I need that, as we only have one Exchange server serving all roles (we don't have a separate Edge server).
Do you have cause for usage of connecting to the server through anything other than Outlook or webmail?
And how many receive connectors are running?
And how many receive connectors are running?
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Well, while there wasn't necessarily a solution here, as I didn't have the logs that I needed to get more information, there was good information provided by the experts for me to look into.
Easiest way to tell is check your outside firewall for inbound SMTP traffic (port 25).