S
Susan Bradley, CPA aka Ebitz SBS Rocks [MVP]
Passing this along....
http://www.sbsfaq.com/news/getArtic...40A459B27C5FF7E6840000B1E572030000&path=News/
I've been investigating this week how one of my customers was used as a
spam
relay host - even though they are not an open relay host. It's a
detailed
issue and according to a number of other sources is a new method the
spammers are using to "sell their products". I've written up an article
(rather than post something too long here) and posted it on
www.sbsfaq.com
if your interested.
I'd be interested to hear feedback on the people who have seen this
attack.
Regards,
Wayne Small [SBS-MVP]
MCSE+I MCSE 2000
Technical Director - Correct Solutions Pty Ltd
For all the answers on Small Business Server 2000 - check out
www.sbsfaq.com
-----------------------------------------------------
And I also got this email.....
Recently we released ORF version 1.2 which automatically whitelists
emails which are sent from authenticated sources.
In the past few days we have received numerous emails
from our
users complaining about unauthorized spam mail relaying
via
their servers.
After investigating these events we found that the
spammers are
using a new technique for finding relay servers. They
get a valid
username/password for the server and use that account to
relay their mail through.
More information about the issue and the prevention for
it can be
found here:
http://www.vamsoft.com/orf/authattack.asp
Sincerely,
Gyula Karakas, CEO
Vamsoft Ltd.
http://www.vamsoft.com
--
"Don't lose sight of security. Security is a state of being, not a
state of budget. He with the most firewalls still does not win.
Put down that honeypot and keep up to date on your patches. Demand
better security from vendors and hold them responsible. Use what
you have, and make sure you know how to use it properly and
effectively."
~ Rain Forest Puppy
http://www.wiretrip.net/rfp/txt/evolution.txt
http://www.sbsfaq.com/news/getArtic...40A459B27C5FF7E6840000B1E572030000&path=News/
I've been investigating this week how one of my customers was used as a
spam
relay host - even though they are not an open relay host. It's a
detailed
issue and according to a number of other sources is a new method the
spammers are using to "sell their products". I've written up an article
(rather than post something too long here) and posted it on
www.sbsfaq.com
if your interested.
I'd be interested to hear feedback on the people who have seen this
attack.
Regards,
Wayne Small [SBS-MVP]
MCSE+I MCSE 2000
Technical Director - Correct Solutions Pty Ltd
For all the answers on Small Business Server 2000 - check out
www.sbsfaq.com
-----------------------------------------------------
And I also got this email.....
Recently we released ORF version 1.2 which automatically whitelists
emails which are sent from authenticated sources.
In the past few days we have received numerous emails
from our
users complaining about unauthorized spam mail relaying
via
their servers.
After investigating these events we found that the
spammers are
using a new technique for finding relay servers. They
get a valid
username/password for the server and use that account to
relay their mail through.
More information about the issue and the prevention for
it can be
found here:
http://www.vamsoft.com/orf/authattack.asp
Sincerely,
Gyula Karakas, CEO
Vamsoft Ltd.
http://www.vamsoft.com
--
"Don't lose sight of security. Security is a state of being, not a
state of budget. He with the most firewalls still does not win.
Put down that honeypot and keep up to date on your patches. Demand
better security from vendors and hold them responsible. Use what
you have, and make sure you know how to use it properly and
effectively."
~ Rain Forest Puppy
http://www.wiretrip.net/rfp/txt/evolution.txt