We're seeing some of this too. The Nigerian phishes for a few accounts 
here and there probably acquired from a spammer email list, and uses one 
webmail system to email users on their other webmail system. They send 
something official looking asking for passwords, banking numbers, birth 
dates, etc all the information they can phish for. The return address is 
typically a phished webmail account they'd broken into somewhere else.

We put notices up to tell customers we won't ask for their password or 
other information via email because we either don't need it or already 
have what we need, and that method is not a good way to do it anyways.

The squirrelmail logs in the email headers the authenticated 
squirrelmail user and the web client's IP address, so it's easy to track 
which accounts were compromised. We lock their accounts and have a 
customer service person have an educational chat with the actual end 
user before assigning a new different password.

I think they manually log in, paste a message in, then paste in a string 
of email addresses to send it to. Their labor is cheap really, and they 
are effective at getting information out of people.

We have a manual block list of IP ranges that we don't allow to access 
the squirrelmail server. They are all african IPs. If we catch a 
phisher, we put the whole class-c or class-b from which they came into 
the block. We haven't had any complaints, and the incidences of abuse 
have dropped way off. I'm sure it's not due to end users wising up.

Unfortunately, if people's email accounts are getting phished, some 
manual customer service/education/management/care is needed, regardless 
of what email software we use or our collaborative computer science 
aptitude.

On Sun, Mar 01, 2009 at 02:50:37PM -0500, Joseph Brennan wrote:
>
>
>> If your users are consistently getting their passwords stolen, then  your
>> users are idiots and you will need to do something like add a  captcha to
>> the webmail login page.
>
>
> If it's the Nigerian gangs that have been attacking university web mail
> for about 12 months now, they are phishing your users with official
> looking notices that ask the user to send account and password.  If so,
> captcha won't do it.
>
> I agree it's not exactly a Spamassassin problem.  But chances are
> the outbound mail would score pretty high, and spam score could be used
> by some other filter as a trigger to stop the mail from going out.  And
> of course a sudden increase in volume from a user could also trigger.
>
> Joseph Brennan
> Columbia University Information Technology
>
>

-- 
/*
Jason Philbrook   |   Midcoast Internet Solutions - Wireless and DSL
    KB1IOJ        |   Broadband Internet Access, Dialup, and Hosting 
 http://f64.nu/   |   for Midcoast Maine    http://www.midcoast.com/
*/

Reply via email to