Re: Mail Attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 24 Aug 2005, Steve Phillips wrote:

> Jessica Zhu wrote:
> > Hi Steve,
> > 
> > Below is one. It is from mx.maria.choppy.com.cl, right? I guess I have to 
> > scan all the bounces. It will be really time consuming.
> > 
> > Date: Wed, 24 Aug 2005 03:43:57 +0800 (CST)
> > From: Mail Delivery Subsystem <MAILER-DAEMON@xxxxxxxxxxxxxx>
> > To: Jessica@xxxxxxxxxxxxx
> > Subject: Returned mail: Service unavailable
> > 
> > The original message was received at Wed, 24 Aug 2005 03:43:52 +0800 (CST)
> > from [211.106.177.167]
> > 
> >    ----- The following addresses had permanent fatal errors -----
> > <chingyu7@xxxxxxxxxxxxxx>
> > 
> >    ----- Transcript of session follows -----
> > mail.local: /var/mail/c/chingyu7: Disc quota exceeded
> > 554 <chingyu7@xxxxxxxxxxxxxx>... Service unavailable
> > 
> >    ----- Original message follows -----
> > 
> > Return-Path: <Jessica@xxxxxxxxxxxxx>
> > Received: from 168.95.5.28 ([211.106.177.167])
> >         by ms28.hinet.net (8.8.8/8.8.8) with SMTP id DAA01186;
> >         Wed, 24 Aug 2005 03:43:52 +0800 (CST)
> > Received: from mx.maria.choppy.com.cl (HELO 24-138.F.dial.o-tel-o.net)
> >         by mx.maria.munich.com.cl (Estfix) with ESMTP id F86203BD55
> >         for <Jessica@xxxxxxxxxxxxx>; Wed, 24 Aug 2005 01:38:50 +0500
> 
> These are the important lines.
> 
> It should also be noted that as spammers forge these lines the first one 
> is generally the only one that can be trusted, but lets follow them all 
> as an example.
> 
> The above says
> 
> "Mail originated from a machine that thought it was called 
> 24-138.F.dial.o-tel-o.net but was mx.maria.choppy.com.cl and was recived 
> by mx.maria.munich.com.cl"
> 
> The next line reads
> 
> "Mail originated from a machine that called itself 168.95.5.28 but was 
> infact 211.106.177.167 and was recived by ms28.hinet.net"
> 
>  From this we can tell that either the first recived line is bogus or 
> somehow the message magically jumped from Chile to the USA (whic his 
> unlikely)
> 
> As a result, the only _real_ information we have is that the spam 
> originated from 211.106.177.167, which was also trying to lie about its 
> identity by calling itself 168.95.5.28 (which is actually the IP of 
> ms28.hinet.net)
> 
> 211.106.177.167 is a Korean network block, and looking up via APNIC
> 
> whois 211.106.177.167@xxxxxxxxxxxxxxx
> 
> produces..
> 
> # ENGLISH
> 
> KRNIC is not a ISP but a National Internet Registry similar to APNIC.
> The followings are information of the organization that is using the 
> IPv4 address.
> 
> IPv4 Address       : 211.106.177.0-211.106.177.255
> Network Name       : KORNET-INFRA000001
> Connect ISP Name   : KORNET
> Connect Date       : 20031129
> Registration Date  : 20031209
> 
> [ Organization Information ]
> Organization ID    : ORG1600
> Org Name           : Korea Telecom
> State              : GYUNGGI
> Address            : 206, Jungja-dong, Bundang-gu, Sungnam-ci
> Zip Code           : 463-711
> 
> [ Admin Contact Information]
> Name               : IP Administrator
> Org Name           : Korea Telecom
> State              : GYUNGGI
> Address            : 206, Jungja-dong, Bundang-gu, Sungnam-ci
> Zip Code           : 463-711
> Phone              : +82-2-3674-5708
> Fax                : +82-2-747-8701
> E-Mail             : ip@xxxxxxxxxxxxx
> 
> [ Technical Contact Information ]
> Name               : IP Manager
> Org Name           : Korea Telecom
> State              : GYUNGGI
> Address            : 206, Jungja-dong, Bundang-gu, Sungnam-ci
> Zip Code           : 463-711
> Phone              : +82-2-3674-5708
> Fax                : +82-2-747-8701
> E-Mail             : ip@xxxxxxxxxxxxx
> 
> This could potentially create problems for you unless you are versed in 
> korean. I would try to send an e-mail to them and hope that someone 
> there understands the language you compose your e-mail in. Failing this, 
> you may want to redirect a bunch of these messages to the admin and 
> technical contacts (which happen to be the same address) and hope there 
> is someone there that understands e-mail headers.
> 
> You should also examine the other messages however as you may find that 
> this box (211.106.177.167) is a comprimised machine that is being used 
> to relay spam and hide the real person.
> 
> In this case you are goign to have a major job tracking these people 
> down - if this is the case try to find an address range used that 
> originated in a country that you speak the language of fluently and try 
> calling them - they may be able to help you track down the actual 
> originator of these messages and you can then either persue legal 
> proceedings or request their real ISP to shut them down.
> 
> However, the problem can get worse, if the spam is originating from a 
> "spam gang" then you are pretty much out of luck and will either have to 
> shut down the domain or buy a bigger box to cope with the attack. 
> Eventually the spam will stop..
> 

Appreciate Steve. 

I will try to contact them and also will consider to get another big box 
if our current one cannot co-op with the situation.

If I get another one, I'd like to set up multi-layer on it to scan virus, 
spam and prevent forge. Do you guys have any structure suggestion for 
this?

Jessica


-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux