[nsp-sec] Why so much WebMail Abuse / Credential Theft? A Theory...

Dave Mitchell davem at yahoo-inc.com
Mon Mar 24 21:18:09 EDT 2008


Gerard,
  I think Mr. Salusky from AOL might have some interesting info on this
topic. William, you passed out or alive? :)

-dave

On Mon, Mar 24, 2008 at 10:38:39PM -0230, White, Gerard wrote:
> ----------- nsp-security Confidential --------
> 
> Greetings.
> 
>  
> 
> When examining the plethora of /32s that are connecting to our WebMail
> servers using stolen credentials
> 
> to propagate spam, it becomes a rather endless task to try and blacklist
> these - as they seem to be popping out
> 
> of the IP woodwork...
> 
>  
> 
> After a bit of study, I am beginning to see a rather common pattern
> evolving from these evil /32's:
> 
>  
> 
> 1)       They appear to be attached to a P2P network
> 
> 2)       They appear to have a HTTP Proxy that is being "used" by
> members of our customer base
> 
>  
> 
> So what "appears" to be happening is these evil entities are being
> set-up/equipped with a HTTP Proxy, and appropriately named malware
> 
> that is being propagated on P2P networks under a more attractive name
> that is being grabbed by P2P users.  The malware
> 
> is tailored to turn-on a HTTP proxy option for the victim's web browser
> - thus the WebMail (and other) credentials are getting
> 
> grabbed...  Subsequently, miscreants with the collected WebMail
> credentials are using the same proxy to hit our own
> 
> WebMail front ends to do their spam runs...
> 
>  
> 
> While I acknowledge the fact that phishing runs are also being used to
> gather WebMail credentials, this "system" is working
> 
> a lot more effectively... hence even going through the motions of
> changing the Customer's WebMail credentials is failing since
> 
> the proxy-option malware is just gathering the new credentials without a
> problem...
> 
>  
> 
> It would be interesting to know if others are seeing their WebMail being
> abused by a similar zero-day system... 
> 
>  
> 
> Never a dull moment in an ISP's world...
> 
>  
> 
> GW
> 
> 855 - Aliant
> 
>  
> 
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 186 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20080324/b0ea552d/attachment-0001.sig>


More information about the nsp-security mailing list