[nsp-sec] Bounce message backscatter attack against abuse mailbox
Mike Lewinski
mike at rockynet.com
Thu Apr 24 11:10:48 EDT 2008
I post to our client-facing Security and Status blog yesterday in
response to complaints about an increase in bounce spam:
http://status.rockynet.com/index.cgi/advisories/mail/spam-bounces
"not only does using a bounce delivery mechanism allow them to evade
many spam filters, but it also increases the likelihood of the end user
seeing the actual spam contents instead of deleting it based on either
Sender or Subject criteria."
Given these two factors, I expect bounce delivery to become more popular
and NDRs to become even less useful. I got the first bounce spam at a
personal gmail account about a week before it showed up at work. Then it
was quiet for a couple weeks, and now I'm seeing a low volume again on
the personal account. I don't think this is backscatter, I think I'm the
intended recipient.
My experience has been that the spammers have stopped making any attempt
to clean abuse@ addresses from their lists (though based on the ratio of
foreign-language spam I'd say that this is more true in Asia). Prior to
this recent increase in backscatter we'd observed a steady increase in
the volume of spam being sent directly to abuse@ (and yeah, we'd love to
filter that and still receive real reports but I don't know how without
writing some code myself).
We also have an older advisory out about the particular issues with
spurious NDRs from Exchange server:
http://status.rockynet.com/index.cgi/email
I discovered last week that an old legacy Imail listserv machine was
being used as a bounce delivery mechanism (albeit at a low enough level
that only a manual audit of the spool turned it up, perhaps 1-3 / hour).
Basically Imail will bounce to the header From: address messages sent to
a restricted posting listserv. There are a couple other ways to get the
Imail listserv mechanism to generate such bounces but I was able to
point it at a postfix smart host and delete them after the fact with
header checks (working on replacing the old listserv with mailman).
We are taking a number of different steps to harden our shared mail
infrastructure. All the users are migrating to a new set of servers with
SSL required for all connections. We're taking time to educate customers
about the importance of SSL authentication in preventing pharming-type
attacks against their mail accounts. Also the incidence of brute force
attacks against the POP3 service is leading to a crackdown on poor
passwords. So we're educating users that "even if you think there's
nothing of value in your account, system resources are always of value
to spammers and the server is only as strong as the weakest user password".
Mike Lewinski
Rockynet.com, Inc.
INOC-DBA 13345*MJL
POTS: 303-629-2860
More information about the nsp-security
mailing list