How were UNIX machines taken over by SPAMMERS?


 
Thread Tools Search this Thread
Special Forums Cybersecurity How were UNIX machines taken over by SPAMMERS?
# 1  
Old 02-05-2010
How were UNIX machines taken over by SPAMMERS?

Hello,

Three of our machines at work were sending out SPAM on the internet. 2 of them were so old I knew that the hackers just exploited the vulnerabilities in the old systems. The cause of concern is that one one of the machines is a new Centos 5.3 box.The only proof we have is that 4-6 emails were send by root on this system whereas the other two had 30,000 emails sent.

We are running sendmail-8.13.8-2.el5 on the Centos 5.3 box. It is configured to listen just locally so that it is secure. Do you think root was compromised on this CENTOS 5.3 box?
# 2  
Old 02-06-2010
Turning a machine into a spamzombie is usually a combination of exploiting vulnerabilities on the target machine and a dictionary attack on one of the users. The attack may also include the installation of its own little mail server. In other words, a large part of such an attack is script driven and if this happened to you, you may be able to find something in the logs just prior to when the first email was sent. Note that once an attacker is inside the DMZ, it matters little whether the other nodes are up to date with the latest software or not.
# 3  
Old 02-09-2010
Were the "other two" systems unix systems or M$ ?

Is your LAN connected to the Internet without a firewall and without an email proxy server?
# 4  
Old 02-09-2010
They were behind a firewall and they were old UNIX machines though. No proxy server being used. I think we should use one...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Script to change the file at one go on different UNIX machines

Hi Folks , I have a query that is I have a server (unix machhine) to which I login thru winscp or putty , mostly I use putty and at a particular location there is one xml(abc.xml) while which I change , let say 1) I login to first unix box hostname :- ccc74 username ... (1 Reply)
Discussion started by: tuntun27272727
1 Replies

2. Shell Programming and Scripting

How to change passwords for User accounts on multiple UNIX/Linux machines remotely?

Hello Experts, Need some direction on creating shell script for following environment: We have about 20 people in the team working as Oracle DBA's (sysdba's and appdba's). Total Servers which is a mix of Unix and Linux are 200. We do not have Root user access on any of the servers and... (3 Replies)
Discussion started by: sha2402
3 Replies

3. What is on Your Mind?

What's your favorite SSH client to connect to UNIX/Linux machines?

I am curious about the most popular ssh client on Windows environment. Talking about me, I use PuTTY most of the time coupled with WinSCP to transfer files. But, I like Tera Term too. It has great drag-drop feature where you can drag a file/folder and drop on the window and it will transfer the... (14 Replies)
Discussion started by: admin_xor
14 Replies

4. Shell Programming and Scripting

how to ssh to remote unix machines using private/public key

hello, iam able to ssh to a linux server from a linux server called "machine1" using the private/public key method, so I dont need to enter any password when I run my script but iam not able to ssh from machine1 to a UNIX server, access is denied. note that I am using an application id which is... (6 Replies)
Discussion started by: wydadi
6 Replies

5. What is on Your Mind?

Spammers: Advice being sought

The Web-based contact form on my site has been under distributed spamming attacks for nearly a month already. Obviously, a spammer has tried to generate HTTP requests containing ads to male drugs and all sorts of similar stuff directly to the form mail processor script on my site using a robot, as... (5 Replies)
Discussion started by: cbkihong
5 Replies

6. IP Networking

How can i simulate network problems between unix machines ?

Hello all i need to simulate method invocations between 2 machine ( using corba ) now i like to test the method invoke timeout from machine1 to machine2 for that i need to simulate network being busy , can it be done some how ? (2 Replies)
Discussion started by: umen
2 Replies
Login or Register to Ask a Question