Forum Moderators: DixonJones
I'm new to the forum, found you on a Yahoo search. I'm fairly literate on PC's, but no so much in the web world. I have a new domain and site, and had an e-mail forward account (not even an actual e-mail account until recently) snatched/compromised/spoofed. My domain hosting company states they're unable to help. You guys seem pretty knowledgeable, based on the posts, so where do I start?
Just so everyone knows, my goal is search and destroy. I have no sympathy for thieves, criminals, or unscrupulous behavior.
And you'll probably discover that the spam originates from somewhere in the Eastern European block or Far East... and that the website is hosted in China...
Welcome to WebmasterWorld. :)
I've tried doing that using www.dnsstuff.com, but I'm not finding much that is useful. My domain host company (GoDaddy.com) says they can't find anything either.
I just got a couple e-mails back this morning, one was an auto-reply from someone's server indicating I'd sent a virus infected file? (see below)
The prod.mesa1.secureserver.net is GoDaddy's mail server and that's confusing the heck out of me. These e-mails actually look like they're coming from my domain! I NEVER send from info@american.....blah, blah, blah. It's just an incoming account, and it's not a catch-all. None of my accounts are catch-alls. I'm feeling pretty ignorant about this stuff!
<snip>
[edited by: engine at 8:42 pm (utc) on Dec. 1, 2004]
[edit reason] TOS [/edit]
JimBeetle,
I believe I know what you're talking about. The bounce back e-mail has 2 attachments with it, one is from the recipient's server indicating that it removed the Netsky variant, and the other (I suspect) will be the original message, right? I haven't opened it because when I click on it, the PC doesn't recognize what application I want to use to open it.
I use Panda's Business Secure on a MS 2003 Server SMB and the client side is a notebook running MS XP Pro SP2. Should I gamble and try opening the bounce, even though it's probably infected? Wonder if Panda will clear it first?
Ideas?
In any event, SPF won't have any effect on *returned mail* since the sender is legitimate in this case.
Should I gamble and try opening the bounce, even though it's probably infected?
Definitely not!
<added> If you're getting bounces from infected mail, this is NOT the same as someone using your email address as a spam bounce path. eg. your email could be in the address book of an infected PC. <added>
You know what my domain hosting company suggested? Change your domain and create a "point-to". Yea, good answer, not!
I'm in an industry that unfortunately isn't known for it's ethical business practices, I really don't want to start playing around with re-directs and changing domains every time this happens. It makes people even more suspicious (of me/us) than they already are on a normal basis.
"Frustrated, confused, and lost!"
The bounce back e-mail has 2 attachments with it, one is from the recipient's server indicating that it removed the Netsky variant, and the other (I suspect) will be the original message, right?
There are a lot of different things going around.
Most of the ones that I'm getting are total spoofs. They might say "returned mail" etc., but they are not bounces, just made to look like it. Just got one that had 3 netsky attachments. These kiddies are hoping we'll open up one of the "details" attachments.