[BlueOnyx:21169] Re: Spammer
Tigerwolf
tigerwolf at tigerden.com
Sun Jul 16 13:05:36 -05 2017
On Sun, 16 Jul 2017, Colin Jack wrote:
> Looking for ideas. We suspect we have a compromised website on one of
> our servers ÿÿ being used for spam. What is the easiest way to track
> this down? Can see spam being sent via localhost but canÿÿt pin it down.
There are some spamming scripts that do pretty well at hiding, including
erasing themselves once a run is completed. Those get into the system
through compromised user account passwords.
Check ftp logs for unusual tranfers and the local account(s) they went to.
Check user shell history for evidence of creating/running/deleting unusual
programs.
The spambots don't generally use the system sendmail, so those logs won't
show much for outbound. If the spam is generating lots of remote bounces,
the local sendmail logs may show an abnormal amount of incoming rejected
mail to the spamming account.
Use 'iftop' and/or 'iptraf' to watch for outbound mail connections. If
they're spewing a lot, you should be able to tell easily. If short
bursts, or slow spamming, it could be harder to see.
When a run is underway, watch 'top' to see who owns the spamming
process(es).
If you can figure out which user account is the source, change the
password immediately, and kill all that user's processes. This may stop
the spambot without it being able to delete itself and provide extra
forensic details. Notify the user and question them about the situation,
and wipe any suspect files not known to belong to the actual user.
--
=^_^= Tigerwolf
More information about the Blueonyx
mailing list