Have you tried looking in the assp log at using the timestamp?
In this example below the receive time was "Sat,  8 Aug 2009 04:12:01  
-0400"
so I would look in assp/logs/maillog.txt for "Aug-8-09 04:12" (forget  
the seconds and shoot for the minute or previous minute).
Then I'd scan forward thru that two minute period. Anything that  
connects to ASSP logs something like this:
Aug-8-09 00:44:37 [Worker_1] Connected: 93.113.162.195:4412 ->  
8.1.2.3:25 -> 127.0.0.1:125
That would show if the bad guys emailed through assp or are going  
around it via your webserver/php etc.
Note that if they are ingenious haxors they would inject into  
127.0.0.1:10025 because it is the example post spam filter port.
I would also take a look at my webaccess logs for the timestamp. See  
if there is a PUT or POST in that minute, check the link is legal.
If you have other external services which could be misused by  
spammers, check those logs in that 2 minute time-frame.
You should find a link via timestamps unless your server is completely  
compromised.

I've been there - due to the secretary believing she didn't need to  
update anti-virus. She PC was taken over and the hacker watch all the  
traffic in the ISP LAN where he got both sides of SSH conversations.  
He would get on a clean new server with in 2 minutes of me putting it  
on the network which made me suspcious. I ran a port scan of all the  
office computers and found the infested PC. Things went better after  
that.

Al


On Aug 8, 2009, at 6:53 AM, Trevor Jacques wrote:

> Here are four new, recent examples of the problem (there should be
> assp headers on all of them). From what I can tell there is more than
> one source, and they're coming into more than one virtual domain.
>
> Return-Path: <jonat...@e-fta.co.kr>
> Received: from My.MXDomain.com ([unix socket])
>        by My.MXDomain.com (Cyrus v2.3.8-OS X Server 10.5:     9G69) with 
> LMTPA;
>        Sat, 08 Aug 2009 04:12:09 -0400
> X-Sieve: CMU Sieve 2.3
> Received: from localhost (localhost [127.0.0.1])
>       by My.MXDomain.com (Postfix) with ESMTP id 44CBAB6AB15
>       for <webmas...@mydomain1.com>; Sat,  8 Aug 2009 04:12:07 -0400 (EDT)
> X-Virus-Scanned: amavisd-new at MyServer.com
> Received: from My.MXDomain.com ([127.0.0.1])
>       by localhost (My.MXDomain.com [127.0.0.1]) (amavisd-new, port 10024)
>       with ESMTP id VpbA1fEKe0qh for <webmas...@mydomain1.com>;
>       Sat,  8 Aug 2009 04:12:04 -0400 (EDT)
> Received: from mail.e-fta.co.kr (localhost [127.0.0.1])
>       by My.MXDomain.com (Postfix) with ESMTP id 4C700B6AB09
>       for <webmas...@mydomain1.com>; Sat,  8 Aug 2009 04:12:01 -0400 (EDT)
> Received: from mail.e-fta.co.kr (bear [127.0.0.1])
>       by mail.e-fta.co.kr (8.13.1/8.13.1) with ESMTP id n786hceu024160
>       for <webmas...@mydomain1.com>; Sat, 8 Aug 2009 15:43:39 +0900
> Received: (from e-...@localhost)
>       by mail.e-fta.co.kr (8.13.1/8.13.1/Submit) id n786hbWp024153
>       for webmas...@mydomain1.com; Sat, 8 Aug 2009 15:43:37 +0900
> Date: Sat, 8 Aug 2009 15:43:37 +0900
> Message-Id: <200908080643.n786hbwp024...@mail.e-fta.co.kr>
> X-Authentication-Warning: mail.e-fta.co.kr: e-fta set sender to 
> jonat...@e-fta.co.kr
>  using -f
> To: <webmas...@mydomain1.com>
> From: Jonathan Sim<s...@e-fta.co.kr>
> Subject: [ALLWIN] Steam Car Wash
> Content-type: text/html
>


------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with 
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to