GFI Software

Welcome to the GFI Software community forum! For support please open a ticket from https://support.gfi.com.

Home » GFI User Forums » Kerio Connect » Security Breaches
Re: Security Breaches [message #102755 is a reply to message #102753] Wed, 15 May 2013 17:11 Go to previous messageGo to next message
InterHmai is currently offline  InterHmai
Messages: 13
Registered: November 2007
BePo wrote on Wed, 15 May 2013 16:12
Attacks and probes are just normal if you have a computer connected to internet. Sad


Correct. In our specific case, we had IMAP available, but staff do not have instructions on how to use it. So if anyone uses it, it stands out. Or if there are failed logins via IMAP it stands out.

Looking back at our kerio security log, we had pretty much 0 IMAP activity until March, then some failed IMAP logins here and there up until May when the compromised account reports started coming in. We had 2 reported accounts compromised. On the 2nd one, I caught the tail-end of the attack and saw an open IMAP connection on the compromised account that should not have been there. Then I shut down IMAP service entirely and initiated password resets.

So no indication of password hammering, but some probing via IMAP. Then successful entry (apparently via IMAP), and subsequent sending of spam.
Re: Security Breaches [message #102760 is a reply to message #102755] Wed, 15 May 2013 18:08 Go to previous messageGo to next message
BePo is currently offline  BePo
Messages: 12
Registered: May 2013
Location: Germany
InterHmai wrote on Wed, 15 May 2013 17:11

So no indication of password hammering, but some probing via IMAP. Then successful entry (apparently via IMAP), and subsequent sending of spam.

I agree in low probing or no probing during the past 9 months - this month we had 700 attempts on SMTP within 4 days from ONE single ip. The particular probe was in "stealth style" 8 to 15 mins between each try.

As a consequence I installed fail2ban to monitor IMAP and SMTP login failures - 3 attempts within 1 hour will hopefully block those probing.

fail2ban is a little bit tricky to install for Kerio - regexp for date/time stamp.
If someone requires details for fail2ban please let me know.

Re: Security Breaches [message #102761 is a reply to message #102760] Wed, 15 May 2013 18:12 Go to previous messageGo to next message
MacLab is currently offline  MacLab
Messages: 233
Registered: May 2012
might want to invest in a good UTM device.

Edit to say: Kerio Control. Smile

[Updated on: Wed, 15 May 2013 18:12]

Report message to a moderator

Re: Security Breaches [message #102822 is a reply to message #102761] Thu, 16 May 2013 22:07 Go to previous messageGo to next message
Machete
Messages: 187
Registered: February 2012
Location: United States
FWIW - Looking back over the last 2-3 months, this is all I have in my security log on failed login attempts:


[16/May/2013 12:03:12] SMTP: User info<_at_>[mydomain].com doesn't exist. Attempt from IP address 180.159.216.41.
[16/May/2013 12:03:18] Failed SMTP login from 180.159.216.41 with SASL method LOGIN.
Re: Security Breaches [message #102909 is a reply to message #102200] Sun, 19 May 2013 20:31 Go to previous messageGo to next message
andrewrob is currently offline  andrewrob
Messages: 40
Registered: November 2007
I have started a full password reset but as we have 290 users I am doing it bit by bit. My problem is now on the security log its full of password errors as people change their password and forget to go and change all the different programs they use! I cant tell what is hacking and what is legit people!
Re: Security Breaches [message #102968 is a reply to message #102200] Mon, 20 May 2013 18:18 Go to previous message
tonyswu is currently offline  tonyswu
Messages: 86
Registered: July 2010
Location: Bellevue, WA
We had this open to one of our user last week. I don't think the problem is with Kerio though, to be honest. We host some 300 users on our Kerio server, and if the problem is with Kerio I would expect a much bigger impact than 1 user. I definitely think their password was compromised elsewhere and used to login to their mail account.
Previous Topic: Kerio - OpenNMS Notifications via XMPP
Next Topic: Failed to start XMPP service.
Goto Forum:
  


Current Time: Fri Mar 31 01:39:52 CEST 2023

Total time taken to generate the page: 0.04124 seconds