Hi Jeff,
you are not going to see much in the GUI, you have to be in the command
line, and use the mailq as root or sudo to see if a mass of spam is going
out, as a rule it will be choking the mail queue. Then you examine the
headers in /var/spool/mqueue to see who send the spam so you can figure out
the compromised user.

The most common cause is the user giving out their password in response to a
Phishing email, typicially pretending to be the server admin. 
Next would be a brute force attack on the smtp auth port.
Then a brute force attacks on the POP/IMAP username.


- Ernie.


[ Charset UTF-8 unsupported, converting... ]
> I had a vsite-user who's mail account creds were compromised and the
> account was being used to relay spam.  The user suspected the issue, I
> confirmed it in maillog and rotated their creds to stop the flow.
> 
> I was hoping to find a way in the GUI to identify potential issues like
> this in the future by identifying "top senders" and spent some time looking
> through the Usage Information > Email reports but was a bit confused by the
> numbers in that report (they look too low).
> 
> So I had a few questions which I'm hoping somebody can help with:
> 
> 1 - Is the  Usage Information > Email report the right place to find
> top-senders?
> 
> 2 - If it is, which specific sub-report is the one I should be looking at?
> 
> 3 - Why would the values in that report seem too small for my server's
> traffic (by an order of magnitude) for a defined reporting period?
> 
> Thanks!
> 
> Jeff

> _______________________________________________
> Blueonyx mailing list
> Blueonyx@mail.blueonyx.it
> http://mail.blueonyx.it/mailman/listinfo/blueonyx

-- 
"I Ping therefore I am."
_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

Reply via email to