About 24 hours ago, I started receiving hundreds of "failure notice" emails from an external mailer daemon.

I was concerned that this was due to some kind of compromise on my server. It was not - nothing weird with logins or anomalous IPs or anything that would indicate compromise on our end. The sending server has compromised accounts. Those compromised accounts are forging the return path, from address, and message ID.

It's backscatter from a phishing campaign. At first, I tried to contact the server owner through their abuse@ account. They have us blocked for ... "sending spam". (is this characteristic? do blocklists not do SPF verification? can someone just send a bunch of emails with forged return paths and from addresses to get them added to a blocklist? seems very easy to abuse)

They eventually did respond today after the several calls I had made an hour or two into the backscatter attack. The problem has subsided slightly, but I'm still getting a few failure emails every minute. These aren't emails from Pooping Secret about Ancient "Poop Hack" From Japan, but rather an ISP.

What is The Way™, if any, to deal with backscatter? It doesn't seem like there is a turnkey BATV solution for Postfix. I was considering writing a Milter to do it, but I have no idea if it's even worth trying.

I did end up adding the backscatterer RBL, which at least sends these emails to spam. It does remind me of why I don't really like UCEPROTECT blocklists, though - they're very adamant about having my server on the list because it's in a "bad neighborhood", but this ISP sending thousands of emails (that could have been prevented at this point by just recognizing that a single email account on their service is generating thousands of bounces) is considered clean. Maybe I misunderstand the purpose of the RBL and my bias against UCEPROTECT is influencing me here.

I am still not sure what to think of MIPSpace, but I'm a pretty annoyed that they blocked us such that we were unable to contact the abuse@ account for the ISP. Kinda irresponsible, especially because the ISP is also running MagicMail, so I would have expected some better integration where we got some grace to send one or two SPF-verified emails to abuse@ to resolve the issue.

Finally, these backscatter emails seem like something else that can be abused. If someone forges the return path for an email, but has access to it in some way, they can use it to find out which emails don't exist.
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to