Educause Security Discussion mailing list archives

Re: Compromise Email Accounts


From: Jeremy Mooney <j-mooney () BETHEL EDU>
Date: Wed, 4 Feb 2009 15:04:02 -0600

Steven Tardy wrote on 2/3/09 17:46 :
Jeremy Mooney wrote:
Steven Tardy wrote on 2/3/09 14:10 :
i had a "lightbulb" moment a few months ago.

most of the compromised logins are from ip's contained in the spamhaus sbl list.
1) check every login against the spamhaus sbl list.
I'm curious if there was any fallout from traveling users, especially
those in other countries. We've had many legitimate logins from users
traveling in specific areas of the world come from the same IP
blocks/ISPs used to access compromised accounts.  I haven't specifically
looked for sbl listings, but when analyzing some compromises had
problems expanding the search scope (IIRC even to the /24 level) to find
possibly related activity (too much noise from legitimate traffic). I'm
concerned that this approach may either be ineffective or have many
false positives.

we've had 0 false positives using this method.
the spamhaus sbl is the "spammer" list.
the spamhaus pbl is the "policy" list(which includes dial-up/dynamic pools).
the spamhaus sbl does NOT include the spamhaus pbl.

Yea, I see the difference and definitely wouldn't want to do this with
pbl/xbl/zen.  I'm still kinda cautious about the idea that an IP sending
spam using direct SMTP (what sbl lists) should be blocked for other
services (including mail through other protocols even if they have a
valid credential).

i mentioned this for others to detect compromises sooner, at login, before spam are sent.
if all you do is warn based on this, it's a step in the right direction.
knowing is half the battle. (:

Interesting.  I've added code to our system to log for now (for later
analysis and decision), as preliminary checks show that we do have users
with home IPs listed on sbl.  My guess is their machine (or one they
share a DHCP pool or NAT/PAT with) is a zombie on one of the spam
networks.  If someone is stuck on a corporate network for example
NAT/PATed with several hundred other machines including one sending
spam, I don't know that I could support the decision to block them
legitimately using our webmail from their work (which is often their
only source of Internet access and is legitimate use of that access for
those whose schooling is sponsored by their employer).

--
Jeremy Mooney
ITS - Bethel University

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature


Current thread: