Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. Email Spoofing Issue

Email Spoofing Issue

Scheduled Pinned Locked Moved Unsolved Support
29 Posts 8 Posters 233 Views 8 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • luckowL Offline
    luckowL Offline
    luckow
    translator
    wrote last edited by
    #20

    +1 for virus on desktop. Windows?

    Pronouns: he/him | Primary language: German

    1 Reply Last reply
    0
    • W Offline
      W Offline
      webliska
      wrote last edited by
      #21

      @ccfu

      This is what I found as a queued email:

      {
      "ts": 1756359482397,
      "type": "queued",
      "direction": "outbound",
      "uuid": "1332F07B-0C99-419E-A058-C1C88C5B8A94.1",
      "messageId": "<8cdb5704f0341e15369841ea1ed2d8d2ec82cb3e@w*****.in>",
      "mailFrom": "<dikshant@w*****.in>",
      "spamStatus": null,
      "mailbox": null,
      "quotaPercent": null,
      "rcptTo": [
      "blinbernard@sfr.fr",
      "cfcappa@hotmail.com",
      "saqrhani@gmail.com",
      "60saladino@gmail.com",
      "johnbagby@yahoo.com"
      ],
      "remote": {
      "ip": "118.151.221.26",
      "port": 41442,
      "host": "NXDOMAIN",
      "info": "NXDOMAIN",
      "closed": false,
      "is_private": false,
      "is_local": false
      },
      "authUser": "dikshant@w******.in",
      "message": "Message Queued (1332F07B-0C99-419E-A058-C1C88C5B8A94.1)"
      }

      image.png

      No app passwords as well.

      Also, I'm sure there is no virus as well in the system.

      1 Reply Last reply
      0
      • C Offline
        C Offline
        ccfu
        wrote last edited by ccfu
        #22

        The log entry shows that the email originated from an IP in Indonesia which does not have the best reputation (the ISP is PT Centrin Online Prima) and was sent whilst logged in as dikshant@... Does this information help you to identify the connections?

        If you do not recognise the connections, check some of the other log entries. Are the mails all being sent from the same IP? If so, you could block it in the network settings. If not, do you see a pattern?

        1 Reply Last reply
        0
        • W Offline
          W Offline
          webliska
          wrote last edited by
          #23

          No, they have no connections with us. Also, I have blacklisted and blocked those IPs. I found 2 IPs for the same.
          You said that emails were sent whilst logged in as dikshant@ So how can they have access if I have changed the password?

          1 Reply Last reply
          0
          • robiR Offline
            robiR Offline
            robi
            wrote last edited by
            #24

            Use the bottom right button from your screenshot to log them out.

            Conscious tech

            1 Reply Last reply
            1
            • W Offline
              W Offline
              webliska
              wrote last edited by
              #25

              @robi Yes, I did that already, but if not don,e then even if changing the password for the email won't log them out on its own?

              robiR 1 Reply Last reply
              0
              • W webliska

                @robi Yes, I did that already, but if not don,e then even if changing the password for the email won't log them out on its own?

                robiR Offline
                robiR Offline
                robi
                wrote last edited by
                #26

                @webliska logins are session based.

                You can change the password all you like, as long as the session is active, it doesn't prevent access.

                The logs may be misleading in printing the user logged in, when it's really just checking for an active session.

                Hence the button exists.

                Conscious tech

                jdaviescoatesJ 1 Reply Last reply
                2
                • C Offline
                  C Offline
                  ccfu
                  wrote last edited by
                  #27

                  Maybe reboot the server for good measure as well.

                  1 Reply Last reply
                  1
                  • robiR robi

                    @webliska logins are session based.

                    You can change the password all you like, as long as the session is active, it doesn't prevent access.

                    The logs may be misleading in printing the user logged in, when it's really just checking for an active session.

                    Hence the button exists.

                    jdaviescoatesJ Online
                    jdaviescoatesJ Online
                    jdaviescoates
                    wrote last edited by
                    #28

                    @robi said in Email Spoofing Issue:

                    logins are session based.

                    You can change the password all you like, as long as the session is active, it doesn't prevent access.

                    This was the other thing I was wondering, together with a virus laden local machine somewhere, i.e. an active session on a dodgy machine.

                    I use Cloudron with Gandi & Hetzner

                    1 Reply Last reply
                    0
                    • humptydumptyH Offline
                      humptydumptyH Offline
                      humptydumpty
                      wrote last edited by humptydumpty
                      #29

                      Regarding infected PC's, I recommend installing Malwarebytes (free) and doing an advanced scan. I caught a crypto miner that Windows Security (Defender) didn't. It was so stubborn to remove that I had to scan/quarantine it twice. CPU/GPU usage would spike when idle, but it would hide when in use or if I opened task manager. PC is used for gaming only so that's definitely how it came in and the top culprits are: Epic games, GTA 5, or Microsoft Flight Sim (mods related).

                      To summarize the key recommendations for OP:

                      • scan PC for malware/virus
                      • delete app passwords found in user's profile section
                      • reset passwords
                      • use the log out button to end all active sessions
                      • restart server for good measure
                      • report back
                      1 Reply Last reply
                      1
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • Bookmarks
                      • Search