Forum Moderators: open

Message Too Old, No Replies

Thoughts on whether my client's Exchange has been breached?

         

csdude55

5:24 am on Jun 17, 2021 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



This is NOT on my server, so it's harder for me to debug. But it's a client that I've helped a bit in the past, so I'm doing some value-added work. For clarity, I'll call him John.

John uses Microsoft Exchange. Today, one of the other employees in Exchange received an email that appeared to be John; the return address was John's, the signature file was his, and the email referenced the employee by name. The employee replied, and John replied back, this time referencing 2 other employees by name!

But John did not actually send either email.

The first email requested for a payment to be sent to one of their "clients", so it's VERY lucky that the employee called him before processing!

I was told by one of those employees that John had said that he saw the email in his own Sent folder, too. But that has not been confirmed.

Looking at the headers, I can't determine whether it originated from his Exchange or not. This is what I think is relevant (replacing his domain with "example.com"):

Authentication-Results: spf=fail (sender IP is 204.93.216.105)

smtp.mailfrom=example.com; example.com;

dkim=pass (signature was verified)

header.d=ihomepedia.com;example.com; dmarc=none action=none

header.from=example.com;compauth=fail reason=601

Received-SPF: Fail (protection.outlook.com: domain of

example.com does not designate 204.93.216.105 as permitted

sender) receiver=protection.outlook.com; client-ip=204.93.216.105;

helo=vps.ihomepedia.com;


I have the whole header, but it's 200 lines so I didn't want to overwhelm you :-) I can post any of it that you want to see, though.

To me, the email looks to be originating from a separate IP (204.93.216.105), so they wouldn't have actually gained access to his account or server. But how did they copy his signature file and know employee names?

And it passed DKIM?

Mark_A

12:25 pm on Jun 25, 2021 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



A timely post. We had someone spoofing an email from an employee last week also.

They had an exchange with a contact of ours, none of this appearing in our email record.

We will be investigating further Monday but can say that the originating IP was not one of ours.

csdude55

6:39 pm on Jun 25, 2021 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I still haven't been able to determine whether he was ACTUALLY compromised. As far as I can tell, though, they were using Thunderbird where "John" uses Outlook, so I know that the emails didn't actually originate through his computer. But the fact that the one employee replied, and the scammer replied back(!), makes it look like he was compromised.

I've looked at the email that the employee sent in reply, and as far as I can tell it was exactly John's email. So he HAD to have been compromised? But if that's the case then what's up with the SPF failure?

John changed his password and seems to have stopped worrying about it, but I don't think he's taking it anywhere near seriously enough. He has 5+ years of emails with all kinds of confidential client information, and he has no idea how many clients were emailed by the scammer :-O

archiweb

5:51 am on Jun 27, 2021 (gmt 0)

5+ Year Member Top Contributors Of The Month



its 2021 and every domain should have a strict DMARC policy set (along with DKIM and SPF).

Adding rua=mailto:dmarcrua@example.com; ruf=mailto:dmarcruf@example.com; to your policy shall reveal who is trying to spoof the domain.

Based on the DMARC xml reports I've seen in the recent years — AWS, Google Cloud, Hetzner, OVH, a few Scandinavian hosters, the Russians, and most Asian hosting companies... are the ones allowing these actors — no surpises here.

Also, the issue might be related to the relatively recent 2021 Microsoft Exchange Server data breach...

Mark_A

11:56 am on Jul 13, 2021 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



@csdude55 "John changed his password and seems to have stopped worrying about it,"

He won't have to wait too long, the fraudster / hacker will be back.