[BlueOnyx:04707] Re: send mail Relay exploit

Michael Stauber mstauber at blueonyx.it
Mon Jun 7 18:25:00 -05 2010


Hi Hugo,

> since friday our server has been exploited as a relay for several domains
> who are spammers

Do you have SMTP-Auth enabled? If not, enable it. But from what I see it in 
your logs it should be on already.  With SMTP-Auth enabled only users 
authenticated with their username and password can send emails through your 
server.

> Here is some logs

>From those log lines only one entry indicates the actual relaying of emails 
through your server:

Jun  7 16:23:14 ns1 sendmail[23694]: o57LMj4U023694: 
from=<tbent at wanadoo.co.uk>, size=1509, class=0, nrcpts=50, 
msgid=<201006072122.o57LMj4U023694 at ns1.abaco.net.mx>, proto=ESMTP, daemon=MTA, 
relay=adsl1888.4u.com.gh [41.210.18.88]

Someone from the IP [41.210.18.88] sent a 1509 byte large mail to 50 
recipients in one go. The line "proto=ESMTP" indicates that he used SMTP-Auth 
to authenticate against Sendmail and that was apparently done with a valid 
username and password.

Then the next snippet shows how four of the 50 generated emails were sent out:

Jun  7 16:23:16 ns1 sendmail[23755]: o57LMj4U023694: 
to=<fultonmr at aol.com>,<fultimeslackervb at aol.com>,<fulmoon19 at aol.com>,<fulltipz at aol.com>, 
delay=00:00:27, xdelay=00:00:02, mailer=esmtp, pri=1591509, 
relay=mailin-02.mx.aol.com. [205.188.155.110], dsn=2.0.0, stat=Sent (2.0.0 Ok: 
queued as 3EC3F38000CAD)

This went to some AOL users in one go.

So it appears someone has guessed, sniffed or brute forced the login details 
of one of your email users.

How to find out which account that's from?

Check /var/log/maillog and find the entries immediately above this one:

Jun  7 16:23:14 ns1 sendmail[23694]: o57LMj4U023694: 
from=<tbent at wanadoo.co.uk> [...]

There should be a line like this:

Jun  7 16:23:14 ns1 sendmail[XXX]:  AUTH=server, relay=adsl1888.4u.com.gh 
[41.210.18.88], authid=USERNAME, mech=PLAIN, bits=0

That shows "authid=" and the username they used to send the email.

Or you can use cat and grep to search for it like this:

cat /var/log/maillog | grep AUTH=server | grep 41.210.18.88

That searches for "AUTH=server" (which identifies the SMTP-Auth logins) and 
for the IP address of the sender of the email. That will return all matching 
log entries and the "authid=" part will reveal the compromised username.

-- 
With best regards

Michael Stauber




More information about the Blueonyx mailing list