[63808] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: New mail blocks result of Ralsky's latest attacks?

daemon@ATHENA.MIT.EDU (Bob German)
Fri Oct 10 11:42:43 2003

From: "Bob German" <bobgerman@irides.com>
To: <nanog@merit.edu>
Date: Fri, 10 Oct 2003 11:31:20 -0400
In-Reply-To: <3F86CFCA.2080904@outblaze.com>
Errors-To: owner-nanog-outgoing@merit.edu



He grabbed a couple of our customers' IMAIL servers, and I'm pretty sure
discovered a few weak passwords by brute force.

Bob
 


-----Original Message-----
From: Suresh Ramasubramanian [mailto:suresh@outblaze.com] 
Sent: Friday, October 10, 2003 11:27 AM
To: Brian Bruns
Cc: Bob German; nanog@merit.edu
Subject: Re: New mail blocks result of Ralsky's latest attacks?


Brian Bruns writes on 10/10/2003 8:42 PM:

> Tis one of the reasons why I've disabled SMTP AUTH on all of my 
> servers
> for now.  I've known about this for a few weeks now.  Its not 
> surprising.  Most of the servers cracked are Exchange servers
(probably 
> thanks to weak passwords), but I still don't feel like taking a
chance.

Exchange (and MDaemon) seem to be targeted extensively - they have 
admin:admin and guest:guest type default accounts that, if they aren't 
locked down, can be used to AUTH and send out mail.

-- 
srs (postmaster|suresh)@outblaze.com // gpg : EDEDEFB9
manager, outblaze.com security and antispam operations


home help back first fref pref prev next nref lref last post