Re: Spam Sent from WebMail

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Sorry to reopen a thread, but I am seeing the same issue as the original
poster in this thread:

http://sourceforge.net/mailarchive/message.php?msg_id=c11d02530709050557ldb78519i4cdecd1ea08dc368%40mail.gmail.com

In that I am seeing spam sent through my SM install, packages are:

CentOS 4.5 w/ squirrelmail-1.4.8-4.0.1.el4.centos. Plugins are:

  Installed Plugins
    1. delete_move_next
    2. squirrelspell
    3. newmail
    4. mpppolicygroup
    5. quota_usage

  Available Plugins:
    6. translate
    7. compatibility
    8. spamcop
    9. sent_subfolders
    10. check_quota
    11. filters
    12. calendar
    13. info
    14. message_details
    15. listcommands
    16. mail_fetch
    17. twc_weather
    18. show_thumb
    19. captcha
    20. bug_report
    21. fortune
    22. lockout
    23. administrator
    24. addgraphics
    25. abook_take

Apache version httpd-2.0.52-32.3.ent.centos4 w/ mod_access_rbl
PHP version php-4.3.9-3.22.9

Symtoms are:

Somehow a botnet operator gets ahold of a valid username and password. I
assume through trojan activity. The botnet then proceeds to sent mail
through squirrelmail using a *valid* username and password. I think that
it is a botnet because the same username has many hits from widely varying
IP addresses. Changing the password blocks the spam and stops the
behavior.

I am certain that this is not a case of forged headers for the same
reasons as the OP: Spam shows up in the Sent folder, disabling the account
stops the spam, and I see the traffic in the web server logs. We have also
been blacklisted on a couple of RBL's due to this issue.

Per some suggetions in the thread I was able to determine that they are
not using "mailto.php", but rather compose.php:

/var/log/httpd/access_log:196.1.179.183 - - [07/Oct/2007:21:54:10 -0500]
"GET /webmail/src/compose.php?mail_sent=yes HTTP/1.1" 200 37102
"http://webmail.terraworld.net/webmail/src/compose.php?mailbox=None&startMessage=0";
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"

It doesn't seem to me like this is a bug or a security vulnerability in SM
since a valid users' password was compromised, but is there any way to
mitigate this type of thing?

Nobody can reasonably expect an ISP to keep every single users' PC clean
of trashware constantly, so accordingly there needs to be some way to
mitigate the impact of this type of issue.

This happened once before, but it was an assault against weak passwords in
our accounting systems. We cleaned that problem up and as a result
installed mod_access_rbl on the web server, which does RBL checks against
spamcop - anyone that tries to log in to webmail has to make it past that
RBL check, but still this has happened! The total number of spams in the
users "Sent" box was only a few hundred, so it seems like the RBL mod
helped quite a bit, but still some IP addresses on the botnet were not
RBL'd.

I would appreciate any feedback regarding this topic and methods of
mitigating damage done by compromised accounts. I will also answer any
questions that may help develop a method of mitigation.

If anyone is interested in the mod_access_rbl, I'm having trouble finding
the original page, but I do have a patch file I can send you.

 - Nick Bright
   Network Admin
   Terra World








-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
--
squirrelmail-users mailing list
Posting Guidelines: http://www.squirrelmail.org/wiki/MailingListPostingGuidelines
List Address: squirrelmail-users@xxxxxxxxxxxxxxxxxxxxx
List Archives: http://news.gmane.org/thread.php?group=gmane.mail.squirrelmail.user
List Archives:  http://sourceforge.net/mailarchive/forum.php?forum_id=2995
List Info: https://lists.sourceforge.net/lists/listinfo/squirrelmail-users

[Index of Archives]     [Video For Linux]     [Yosemite News]     [Yosemite Photos]     [gtk]     [KDE]     [Cyrus SASL]     [Gimp on Windows]     [Steve's Art]     [Webcams]

  Powered by Linux