This is the second time I've encountered this from the same user...
One of their email addresses is sending out spam emails that have the subject line "Fwd: Photos"...
I am alerted of this because I get an LFD AUTHRELAY reporting:
Count: 101 emails relayed
The last time I noticed this was happening I changed their email's password and told them to run antivirus on their computer because I assumed someone must have gotten their password... I'm not sure if they followed my instruction. The spammers were successfully being blocked trying to log into their account via LFD's smtp blocking and everything seemed fine for a couple of weeks. The password I changed it to wasn't the strongest but it did include upper and lower characters and digits and LFD was successfully blocking ips after 1 failed attempt so someone must be hacking their system to get the password right?? I can't imagine they guessed it in 100 or so attempts over that time.
Anyways it all started happening again today.
My maillog says the following when the spammers log in to send spam:
Normally the user is a regular email address but when the spammers log in it looks like "__cpanel__service__auth__imap__zq8gb_hztfrl". Is this normal?
The client is only using POP3 and the spammers are using IMAP.
Any suggestions on what I can do to fix this situation? I'm going to drop their relay rate down to something like 20 and give them a long complicated password and scold them into running anti-virus on their system...
If that doesn't work I'll have to get them to host their email or entire website elsewhere.
Thanks
One of their email addresses is sending out spam emails that have the subject line "Fwd: Photos"...
I am alerted of this because I get an LFD AUTHRELAY reporting:
Count: 101 emails relayed
The last time I noticed this was happening I changed their email's password and told them to run antivirus on their computer because I assumed someone must have gotten their password... I'm not sure if they followed my instruction. The spammers were successfully being blocked trying to log into their account via LFD's smtp blocking and everything seemed fine for a couple of weeks. The password I changed it to wasn't the strongest but it did include upper and lower characters and digits and LFD was successfully blocking ips after 1 failed attempt so someone must be hacking their system to get the password right?? I can't imagine they guessed it in 100 or so attempts over that time.
Anyways it all started happening again today.
My maillog says the following when the spammers log in to send spam:
Code:
Feb 5 06:29:15 cp dovecot: imap-login: Login: user=<__cpanel__service__auth__imap__zq8gb_hztfrlrd0og37icroblnh7o7qacaztwl...etc.>, method=PLAIN, rip=127.0.0.1, lip=127.0.0.1, secured
Feb 5 06:29:16 cp dovecot: IMAP(__cpanel__service__auth__imap__zq8gb_hztfrlrd0og37icroblnh7o7qacaztw....etc.): Disconnected: Logged out bytes=11/313
The client is only using POP3 and the spammers are using IMAP.
Any suggestions on what I can do to fix this situation? I'm going to drop their relay rate down to something like 20 and give them a long complicated password and scold them into running anti-virus on their system...
If that doesn't work I'll have to get them to host their email or entire website elsewhere.
Thanks
Last edited: