Risk
5/14/2013
04:01 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

IceWarp Discovers New Sophisticated Spam Delivery Method

Global messaging and collaborations solutions provider recommends setting a strong password policy

Springfield, VA – May 13, 2013 – IceWarp has discovered a new sophisticated Spam delivery method hackers use to bypass most anti-spam defenses and attack computers worldwide, the global messaging and collaborations solutions provider announced today. According to the company's security experts, the following pattern has emerged: hackers steal email addresses and passwords from the outside nodes, and use this combo to break into a corporate email system.

The recent IceWarp security situation analysis showed that the attackers are exploiting the fact that many users often choose the same password for their social media accounts and corporate email. That negligence opens wide opportunities for hackers even if they are able to get hold of just a few passwords. The recent hack of LivingSocial, a popular daily deals platform, showed that cyber criminals immediately applied stolen passwords to break into corporate email accounts.

"The email address is decomposed into two parts, where the domain part is used to lookup the mail server using its DNS MX record (publicly accessible), and the username authenticates that user to the server," explained Antonin Prukl, IceWarp Technical Director. "Once intruders get access to server, they look into the IMAP folder for the recent emails sent by the account's owner. Then they send spam to these email addresses from the same server."

This tactics makes spam attacks extremely effective, since, in most cases, the hijacked sender is on the recipient's server white list.

"There is nothing suspicious in getting an email from an "approved" sender," notes Mr. Prukl. "Such spam delivery process is almost impossible to detect and stop."

According to IceWarp security team, the only effective countermeasure – a part of strict password enforcement policy - is the technical capability to force users to change passwords at the first signs of such an attack.

"IceWarp administration features make password administration easy," says Mr. Prukl. "All administrators have to do is to force users to change their password when they log on. This can be done with just a few mouse clicks."

More information on IceWarp password policy enforcement capabilities can be found here: http://www.icewarp.com/support/online_help/11.0/Content/485.htm

IceWarp, which is considered one of the world's most secure messaging platforms (its anstispam module is using 20 spam protection techniques) is offering special protection options to ward off sophisticated hackers not available from other vendors. One of them is a special trigger administrators can use to issue a company-wide warning and make user change their password once they log into the system. Additionally, the administrators can enforce the password strength, such as including letters, numbers and symbols.

ABOUT ICEWARP

IceWarp is an emerging provider of comprehensive messaging solutions for every business class, size and niche. Building upon a decade of enterprise e-mail platforms experience, IceWarp offers organizations an all-in-one highly secure solution that enables their mobile workforce to communicate through any platform, be it e-mail, mobile synchronization, chat, SMS, voice or video. The highly scalable product can easily be used by organizations of all sizes, from SMBs to large corporations, delivering ease of deployment, exceptional reliability and scalability. IceWarp's solutions are available in over 40 countries through a comprehensive network of distributors.

A rare exception in the messaging space, IceWarp's architecture is based on universal standards, doesn't depend on any client and supports all mobile devices currently on the market.

The company is also offering other products built on its proven core platform. One is LiveWebAssist, a multilingual business chat that allows companies to better monetize website traffic by interacting live with website visitors, from any location, through any device – desktop, laptop, smartphone or tablet. The other is eVisitCare - the doctor-patient secure email communications system.

Already recognized as a leading email solutions provider and a viable Microsoft Exchange alternative, IceWarp (formerly Merak Mail Server) is deployed in more than 20,000 organizations and supports over 50 million users worldwide. The company disrupts the messaging category by delivering all email, mobile synchronization, SMS, chat, voice and video capabilities in one integrated, extremely secure and easy-to-deploy solution. Its customers include such market leaders as Marriott International, Inc., Verizon Communications, Inc., Inmarsat, AVTOTOR, Russian Space Agency, as well as small to midsized firms.

For more information, please visit IceWarp (www.icewarp.com) or follow us on Twitter (@icewarp).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web