AllPro Blog

Spammers have added tools to their bag of tricks to bypass those pesky spamno-spam filters.

Backscatter is a relatively new type where the spammer creates a “fake” sender address, which is actually a known-to-be-good email address. This email will “bounce” off of the recipient’s server due to the content/subject/virus enclosed, and then it will try to bounce back to the original sender — you!

Our typical virus/worm/spam prevention techniques prevent a large number of direct attacks. The reason why these bounce-back spam messages occur is that it is a valid email from a mail system.

The catch is that you never sent it. This does not mean your account or credentials have been hacked or compromised in any way. It simply means that the spammer employed a web-crawler to find, or purchased a list of email addresses to use in their attacks, and yours was found.

This works similarly to sending a letter. You can choose to put whatever you like as a return address (or even leave it blank!) and the post office has no way to verify who actually sent it. If the mail gets rejected, it’s simply returned to whom they assume the sender is.

Typically these are very short-lived attacks. The sender’s IP will be verified by global spam blacklisted and DNS-based lists. Once listed in this manner, most corporate mail servers and larger hosting services(gmail, yahoo, etc) will reject all traffic from the spammer.

There is no good ways to combat this at this time. The only effective way would be to stop sending notifications when an email doesn’t get delivered. We all want to know when an email we send doesn’t get delivered so turning off the “bounce-back” isn’t something anyone wants to do.

 

 
July 14, 2016

Backscatter Email Spam

Spammers have added tools to their bag of tricks to bypass those pesky spam¬†filters. Backscatter is a relatively new type where the spammer creates a “fake” […]
May 23, 2016

Logging into your website with 2-Factor Authentication

In order to increase the security of our hosted websites and make it harder for hackers, we’ve introduced a 2-layer login process. When you need to […]
February 15, 2016

Should you renew your antivirus?

Every PC, MAC, or server is prone to threats in the cyber world. Today, even tablets and mobile phones are prone to various security challenges. All […]
February 10, 2016

Outlook 2013 folders empty – filter applied

In Outlook, if you find that folders where you have stored old (or new) messages appears empty, you may be asking, “Where did all my stuff […]
February 10, 2016

ShareSync Security

SHARESYNC SECURITY FEATURES ShareSync from AllPro Technologies is an enterprise-class file sync and share service. This collaboration tool enables file and folder syncing across user devices, […]
February 10, 2016

Untangle VPN setup

These instructions will help you successfully connect to your corporate VPN so you can work remotely. Successfully connecting to the network is a multi-step process: Install […]
February 9, 2016

Sonicwall VPN setup

These instructions will help you successfully connect to your corporate VPN so you can work remotely. Successfully connecting to the network is a multi-step process. Download […]
January 25, 2016

Setting up out of office in outlook web access

Learn how to set up and modify your automatic out-of-office e-mail response on Outlook Web Access (OWA). These instructions pertain to e-mail accounts hosted on our […]