[63808] in North American Network Operators' Group
RE: New mail blocks result of Ralsky's latest attacks?
daemon@ATHENA.MIT.EDU (Bob German)
Fri Oct 10 11:42:43 2003
From: "Bob German" <bobgerman@irides.com>
To: <nanog@merit.edu>
Date: Fri, 10 Oct 2003 11:31:20 -0400
In-Reply-To: <3F86CFCA.2080904@outblaze.com>
Errors-To: owner-nanog-outgoing@merit.edu
He grabbed a couple of our customers' IMAIL servers, and I'm pretty sure
discovered a few weak passwords by brute force.
Bob
-----Original Message-----
From: Suresh Ramasubramanian [mailto:suresh@outblaze.com]
Sent: Friday, October 10, 2003 11:27 AM
To: Brian Bruns
Cc: Bob German; nanog@merit.edu
Subject: Re: New mail blocks result of Ralsky's latest attacks?
Brian Bruns writes on 10/10/2003 8:42 PM:
> Tis one of the reasons why I've disabled SMTP AUTH on all of my
> servers
> for now. I've known about this for a few weeks now. Its not
> surprising. Most of the servers cracked are Exchange servers
(probably
> thanks to weak passwords), but I still don't feel like taking a
chance.
Exchange (and MDaemon) seem to be targeted extensively - they have
admin:admin and guest:guest type default accounts that, if they aren't
locked down, can be used to AUTH and send out mail.
--
srs (postmaster|suresh)@outblaze.com // gpg : EDEDEFB9
manager, outblaze.com security and antispam operations