Feel free to ignore my incoherent rambling ;)

I'm not sure there's a better way than just notifying the abuse email for the IP owner. Certainly doing so is sound, and while I can't recall the last time I received a complaint for a problem that wasn't already solved I certainly don't mind seeing them. But if the unspoken question is "Will this be effective" that's another thing entirely. We know there are abuse contacts that don't receive mail, others that ignore it (whether maliciously or simply not staffed or automated properly). Another reporter may be of some value, but I don't see it having a huge impact.

I gave up reporting long ago because even when you find an abuse department that listens, they rarely seem able to address the cause of it. So like you've got CloudProviderA reading an abuse complaint about 192.168.1.501 and the culprit has already spun up 300 new cloud servers and created 30 new accounts under different aliases with residential IPs and matching geolocation by the time they finish reading the email. "Well that account is terminated, next."

What I'd like to see more of is a good way to share amongst each other, in a controlled environment, information that helps prevent the abuse beforehand. For example:

If you search your SMTP logs for an outbound email to borismakarov...@gmail.com, you have identified a compromised email account that will soon begin sending spam.

If all of us had that information as soon as possible, compromised email accounts would tank.

On 2025-03-13 12:50, Michael Peddemors via mailop wrote:
Background:

Compromised email accounts are on the rise, from almost every sector, and often it is the same actors and infrastructures that are being used as a source to send out their malware and phishing from these compromised accounts. Historically, while we identify these threats, we have only used it to protect our own customers, albeit we do share some of this intel with RBL's to make that information more widely available.

But given the high profile of some of the email servers that are being abused, eg government email servers, we are considering actually reporting this information back to the email operators who have the compromised/abused accounts.

However, we need to do this in an automated way, that creates real value for the email operators, while not adding an undue burden to our teams.

The challenge is that because of the diverse nature of email operators, that simply sending an email to abuse@ seems unlikely to work in many cases, and of course.. the recipient has to be assured that our data is indeed accurate..

There are so many different use cases:

* Small operator with a cPanel server
* Large hosting provider with many shared servers
* Enterprise and Governments still using Zimbra
* Gmail, o365, Apple
* Other large email hosting platforms
* Foreign Operators

While, it would be nice to see everyone adopting DROP lists, and AUTH lists, that isn't likely to happen anytime soon..

So, assuming we see one of the above types of operators, leaking dangerous content, where the authenticating IP is on a known threat database (eg, a bullet proof hoster, or IP associated with a well known APT actor), the questions are:

* Should we notify the operator?
* How BEST to notify the operator?

Of course, we could just reject the email as normal, (but usually the only person that would even notice is the bad actor themselves), we could report the email server to an RBL given it is sending dangerous information (of course, Gmail and o365 might be hard to do that).

And of course, no use sending alerts, if they will simply be ignored..

Like to hear from the community, any and all ideas surrounding the topic of feedback intel to email operators when they have compromised emails, from sources that they should block to protect their customers..

Comments?
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to