Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations gkittelson on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Spam information please

Status
Not open for further replies.

StressedTechie

Technical User
Jul 13, 2001
367
GB
I am responsible for releasing emails blocked by our mail monitoring software. I am noticing on regular occasions that spam is entering our system and seems to be trying name variations. ie say we have a johnsmith@domain.com, a janedoe@domain.com, a Timjones@domain.com and a barrylloyd@domain.com then messages seem to come in addressed to johndoe@domain.com, john@domain.com, timlloyd@domain.com etc it seems to be trying differnt name variations until it gets it right. These are all being blocked so I am not worried just interested to know how Spam tries and knows about these variations.

Cheers
 
i have heard that you can disable the "catchall" email function. that way incorrect (spam) emails will bounce and lessen the amount of spam you continue to get.
 
That brings to mind something I've seen in spam I have received....

Addressee in the "To:" address block does not have to have any connection to the address to which the email is being sent. I see a lot of spam messages arrive at my mailbox with strange addresses in the "To:" field, but when I check my mail server logs, I find that the actuall recipient (the one whom the "rcpt to" SMTP keyword specified) is my address.

I don't know why spammers do this -- perhaps it's to muddy the waters for the "average" user.



Want the best answers? Ask the best questions! TANSTAAFL!
 
It's using the BCC (blind carbon copy) feature of SMTP mail, and they do it so that you can't see the gazillion other real email messages they also sent the message to. It makes it look more 'authentic'. So yes, in a way, to muddy the waters!

The SMTP mail protocol was designed in the days when people trusted other people, and thus doesn't have any security or authentication built into it. It relies on people being honest about who they are when they send email, so it's easy to abuse.
 
Actually, it does have the ability for authentication. But the RFC says it should be anonymous by default.

What appears to be happening here is a mediocre directory harvesting. I see that all the time.

Don't configure a catch all account, and have the filtering software bounce everthing that doesn't match with an account.

And disable your OOF (out of office) to the Internet (if you enabled it on your mail server).

Pat Richard, MCSE(2) MCSA:Messaging, CNA(2)
 
58sniper,
And disable your OOF (out of office) to the Internet (if you enabled it on your mail server).

thanks, i forgot to mention that. it is one sure way to let spammers know of a valid email address.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top