Though a bit of a non-standard approach, I collect email subjects and recipients from accounts that were compromised and used by the attacker to send email. I use rspamd to mark them, and then I use bash scripts to check for emails that hit the rspamd triggers and alert via Pushover that an event needs to be investigated. It's so consistently on point that I later plan to automate suspension and/or force password changes on users that trigger them. Off the top of my head I'd say I catch 9 out of 10 compromised email accounts with this process.

A couple examples of the data I use:

- Including the IMAP server hostname in the email subject (there's an attacker out there that emails themselves, from the compromised account, username+password+imapserver as an email subject to test login credentials)

- Email subject "LARAVEL SMTP CRACK" means the user left their email credentials exposed in a Laravel installation

On 2021-09-21 10:08, Alessio Cecchi via mailop wrote:
Hi,

we are an email hosting provider, and as you know many users use weak
passwords, or have trojan on their PC that stolen their password that
are used to sent spam or doing some kinds of fraud.

We already have a "script" that checks, from log files, the country of
the IP address and "do something" to detect if is an unusual login.
But is not really sufficient.

For "do something" I means:

- too many logins from different country
- too many fast login

So we are always looking for a system/software/service/script to
detect login to POP IMAP or SMTP not made by the user.

I have also test the AWS SageMaker IP Insights service but without
success.

Have someone experienced about these problems?
Thanks

--
Alessio Cecchi
Postmaster @ http://www.qboxmail.it
https://www.linkedin.com/in/alessice
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to