Nick submitted a nice piece of malware we are currently looking at. The malware itself includes a nice rootkit that doesn't appear to be detected with common rootkit tools. However, in my opinion, the delivery method was noteworthy. It used a spoofed internal sender. This made me wonder what's the best way to block e-mail that comes from outside mail servers, but claims an internal "From:" header. My first guess would be that this is a great reason to enable SPF. Will this work? I am assuming that it is a standard policy to require employees to use a VPN connection or "something like that" to send e-mail using an internal mail server. Any other ideas? I will be teaching next: Defending Web Applications Security Essentials - SANS Cyber Security West: March 2021 |
Johannes 4072 Posts ISC Handler Jun 26th 2007 |
Thread locked Subscribe |
Jun 26th 2007 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!