I'm having a strange issue. One of my cPanel accounts (with 4 mail accounts) is being exploited every week. Like clockwork, Monday morning, first thing.
Mail is being sent from SMTP from their accounts.
This is the fifth week it has happened, and I'm not sure how it is happening. We have done the following:
1. Verify password strength, passwords are random letters, characters, and numbers, 16-18 characters long.
2. The client does not know their passwords. Their computer guy put it in their Outlook and I put it into their phones. (No device has all 4 passwords on it, so one device can't be at fault)
3. Passwords are transported securely between us technical people, we've used a different method after each event.
4. We wiped all of the workstations involved and done a clean install of Windows 7, and a stronger virus scanner.
5. We've checked their network for an intrusion.
6. The server is using TLSv1.2 only for SMTP.
7. Their website is a clean simple PHP site, with no exploits. I manually scanned it and looked for hack files.
8. Their passwords are exploited, not changed. Hackers are logging into Exim and sending mail. (from a botnet of about 2200 machines/IPs.)
9. This account was moved to our most secure PCI complaint server after the first event.
10. The two technical people involved have been working together for 12 years, so it isn't an inside job. I run the servers, he does PC support and is 100% trusted.
Given all of that, I see no way for hackers to hack these accounts. If it was a server exploit, it would have to be two of our servers, then why only attack this one account.
I doubt this is personally targeted at this client, all that is happening is spam is being sent. If they are getting their email passwords, they could do far worse.
What am I missing here?
Mail is being sent from SMTP from their accounts.
This is the fifth week it has happened, and I'm not sure how it is happening. We have done the following:
1. Verify password strength, passwords are random letters, characters, and numbers, 16-18 characters long.
2. The client does not know their passwords. Their computer guy put it in their Outlook and I put it into their phones. (No device has all 4 passwords on it, so one device can't be at fault)
3. Passwords are transported securely between us technical people, we've used a different method after each event.
4. We wiped all of the workstations involved and done a clean install of Windows 7, and a stronger virus scanner.
5. We've checked their network for an intrusion.
6. The server is using TLSv1.2 only for SMTP.
7. Their website is a clean simple PHP site, with no exploits. I manually scanned it and looked for hack files.
8. Their passwords are exploited, not changed. Hackers are logging into Exim and sending mail. (from a botnet of about 2200 machines/IPs.)
9. This account was moved to our most secure PCI complaint server after the first event.
10. The two technical people involved have been working together for 12 years, so it isn't an inside job. I run the servers, he does PC support and is 100% trusted.
Given all of that, I see no way for hackers to hack these accounts. If it was a server exploit, it would have to be two of our servers, then why only attack this one account.
I doubt this is personally targeted at this client, all that is happening is spam is being sent. If they are getting their email passwords, they could do far worse.
What am I missing here?