Not enough time in the day anymore..

Haven't posted one of these in a little while, so a rare midweek post.

Patterns we are seeing this week:

* High Gmail spam leakage numbers (couple new techniques)
* SendGrid very bad still, eg Canada Post phishing et al
  - MailGun? "My name is Alexei Navalny from Russia"
  - MailChimp, lot's of stripped email addresses
* Router BotNet Auth Attacks on increase again
* High number of Amazon AWS IP(s) in spam and other attacks
* High number of GoogleContent IP(s) in spam attacks
* Digital Ocean IPs still trying (cloudwayapps.com)
* Large reduction in Brazilian router attacks (stopped or takedown?)
* Snowshoe spammers finding new IP space
* Register.it and Aruba.it, still can't get it together, high compromise account spammers


Now, again of course, all this can be prevented, but still surprising how little is being done at the source. Most of it is really obvious, and so easy to detect at the sending side.

And of course, the compromise accounts we see worldwide could really benefit from simple little things, authentication checks should be improved, and of course not allowing authentication from known hack bots, if you aren't checking safe RBL's which list attack sources (eg SpamRats RATS-AUTH) or do not route lists such as RATS-NULL (there are others that are freely available, I think SpamHaus also has an authentication RBL).

They're free to use, why not use them.. Multiple ways to do look ups.

Oh, and while this might make the 'privacy' advocates shudder, if you DO present the authenticating IP(s) in your headers, those companies in the threat detection and mitigation space can find new attackers in play.

Share the IP(s) authenticating, in today's world of NAT and shared IP(s) there is very little risk of exposing 'new' PPI, and it quickly helps every one from being the next victim of known offenders.

Authentication-Results: h2847185.stratoserver.net;
        spf=pass (sender IP is 193.56.29.194)

Received: from asianlife.com.np (ec2-3-38-252-15.ap-northeast-2.compute.amazonaws.com [3.38.252.15])
        by mail1.asianlife.com.np (Postfix) with ESMTPSA

At least have good trace headers..

But better yet, the user@ip format enables threat mitigation specialists to notify you when you have compromised accounts sending spam, with more precise details to address the problem.










--
"Catch the Magic of Linux..."
------------------------------------------------------------------------
Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.
------------------------------------------------------------------------
604-682-0300 Beautiful British Columbia, Canada

This email and any electronic data contained are confidential and intended
solely for the use of the individual or entity to which they are addressed.
Please note that any views or opinions presented in this email are solely
those of the author and are not intended to represent those of the company.
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to