Book now with code EOY2025
RobertKaucher wrote: » Well, I would like to enlist some help as I am not sure what to do in this situation. A few weeks ago a user ran exe from a spoofed email greeting card that looked like it came from the owner of the company. Her system started sending out spam messages. I got that taken care. Then on Thursday we were black listed by Barracuda Networks as having an IP address that sends out excesive spam. I figured it was related to the previous incident and asked to be removed from their list. All was well until Today. We are back on the list. So I am not sure what the hell to do here. I have been running WireShark on the email server and doing captures on the SonicWall gateway that we use. I have not seen anything on port 25 exiting our LAN other than traffic from the Exchange 2003 server. One of the first things I did upon becoming an admin here was to verify we were not an open relay, and I confirmed this again once I started having this issue. I am seeing a lot come accross the wire, but none of it seems like we are sending spam. Do any of you have suggestions as to what I should be looking for that I have not seen yet or that might be obsure and I might not have looked into?
apena7 wrote: » It's a shot in the dark, but was that greeting card .exe only using port 25?
120nm4n wrote: » Probably the case. Any computer on your network could potentially be sending email on any port.
120nm4n wrote: » Probably the case. Any computer on your network could potentially be sending email on any port. Run wireshark as close as you can (if not directly on) to your WAN connection. Don't filter it down to certain ports, but do look for SMTP / POP3 traffic.
hypnotoad wrote: » did the barracuda blocking you send you an NDR? If so, what was the error message? here's a link to the knowledgebase article regarding why a barracuda does this:Barracuda Networks - Worldwide leader in email and Web security
Chivalry1 wrote: » Step 1: Lock down the firewall!! No internal systems should be sending traffic on port 25. Only the Exchange 2003 server. Step 2: Setup some type of independent IDS/IPS system. This will attempt to identify strange network traffic. Step 3: Ensure that Anti-Virus is up to date on Exchange Servers. Step 4: You will likely have to contact multiple DNS Blacklist companies. (Start with The Spamhaus Project ) As a consultant I have ran into this issue multiple times. Its tough getting off these list, but with a little effort you can get this worked out.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!