Re: Spam Sent From WebMail

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I had this exact issue.  It ended up being one exploited account.  The IP
addresses connecting to the account were from various APNIC blocks.  I would
block one IP and it would move to another... suggesting that it was some
kind of bot - however, I added the captcha plugin and they kept logging in!
I changed the password on the exploited account and so far it hasn't
resurfaced.

Brent


Ken A wrote:
> Nick Bright wrote:
>> Ken A wrote:
>>> Nick Bright wrote:
>>>
>>>> Per some suggestions in the thread I was able to determine that they
are
>>>> not using "mailto.php", but rather compose.php:
>>>>
>>>> /var/log/httpd/access_log:196.1.179.183 - - [07/Oct/2007:21:54:10
-0500]
>>>> "GET /webmail/src/compose.php?mail_sent=yes HTTP/1.1" 200 37102
>>>>
"http://webmail.terraworld.net/webmail/src/compose.php?mailbox=None&startMes
sage=0" 
>>>>
>>>> "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"
>>>
>>> Are you saying that was the only entry in the log from that IP? They 
>>> only hit compose.php? If not, what was the sequence of events?
>> There were many hits from quite a few different IP addresses, and they 
>> all looked simmilar to that. I've extracted log entries from that IP 
>> address, and attached the file to this message.
>>
>>  From what I can tell it logs in, then hits compose.php repeatedly.
> 
> That's odd. It really doesn't look like a bot. Perhaps it's using an IE 
> toolbar of some sort to control the browser. There is a CAPTCHA plugin, 
> and a "Password Forget" plugin, but when a bot behaves like a user, it's 
> hard to block without inconveniencing the user. :-\

Yes that was my take as well, it really looks like a user using
webmail but when I go through my AOL mail loop messages they show
headers such as:

from 81.199.179.36 (proxying for 10.250.50.255)        (SquirrelMail
authenticated user exploiteduser)        by webmail.terraworld.net with
HTTP;        Thu, 4 Oct 2007 18:57:06 -0500 (CDT)

IP Addresses from AOL mail loop:
196.1.179.183
78.138.2.196
41.219.220.2
81.199.179.36
84.254.188.2
88.202.124.6

Where the IP address connecting as user "exploiteduser" varies widely,
and the attached message is always the same 'lottry' phishing scam. I 
suppose it's possible that it's coming from the users' PC (they are on 
dialup after all), but the IP addresses vary so widely that I seriously 
doubt that it's one PC. The list is relatively short because I would 
expect most of the botnet to be listed on RBL's, and my web server 
blocks based on RBL lookups.

  - Nick

> 
> Ken
> 
> 
>>  - Nick
>>
>>> Ken
>>>
>>>
>>>> Nobody can reasonably expect an ISP to keep every single users' PC
clean
>>>> of trashware constantly, so accordingly there needs to be some way to
>>>> mitigate the impact of this type of issue at the common point - the 
>>>> SquirrelMail installation. It doesn't seem to me like this is a bug 
>>>> or a security vulnerability in SM since a valid users' password was 
>>>> compromised, but is there any way to mitigate this type of thing?
>>>>
>>>> I would appreciate any feedback regarding this topic and methods of
>>>> mitigating damage done by compromised accounts. I will also answer any
>>>> questions that may help develop a method of mitigation.
>>>>
>>>> - Nick Bright
>>>>   Terra World
>>>>   http://home.terraworld.net
>> ------------------------------------------------------------------------
>>
>> -------------------------------------------------------------------------
>> This SF.net email is sponsored by: Splunk Inc.
>> Still grepping through log files to find problems?  Stop.
>> Now Search log events and configuration files using AJAX and a browser.
>> Download your FREE copy of Splunk now >> http://get.splunk.com/
>>
>>
>> ------------------------------------------------------------------------
>>
>> --
>> squirrelmail-users mailing list
>> Posting Guidelines:
http://www.squirrelmail.org/wiki/MailingListPostingGuidelines
>> List Address: squirrelmail-users@xxxxxxxxxxxxxxxxxxxxx
>> List Archives:
http://news.gmane.org/thread.php?group=gmane.mail.squirrelmail.user
>> List Archives:
http://sourceforge.net/mailarchive/forum.php?forum_id=2995
>> List Info:
https://lists.sourceforge.net/lists/listinfo/squirrelmail-users
> 
> 



-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
--
squirrelmail-users mailing list
Posting Guidelines: http://www.squirrelmail.org/wiki/MailingListPostingGuidelines
List Address: squirrelmail-users@xxxxxxxxxxxxxxxxxxxxx
List Archives: http://news.gmane.org/thread.php?group=gmane.mail.squirrelmail.user
List Archives:  http://sourceforge.net/mailarchive/forum.php?forum_id=2995
List Info: https://lists.sourceforge.net/lists/listinfo/squirrelmail-users

[Index of Archives]     [Video For Linux]     [Yosemite News]     [Yosemite Photos]     [gtk]     [KDE]     [Cyrus SASL]     [Gimp on Windows]     [Steve's Art]     [Webcams]

  Powered by Linux