我们有一个服务器,上面有 300 多个网站,它收到了来自 spamcop 的滥用信。我们调查了日志,并搜索了邮件中描述的 PHPMailer 版本,但都没有找到任何结果。
我想知道是否有某种混淆或编码的 phpmailer 脚本的机会,以及如何找到它。我正在运行 NeoPi 和 Web Shell Detector,但到目前为止还没有出现。
有没有办法监控传出端口25并用域名过滤?电子邮件应该来自的域是干净的,我怀疑另一个代码正在使用这个域,因为它的 DKIM、SPIF 等。
Return-Path: <dianne.l@*****.com>
X-Original-To: x
Delivered-To: x
Received: by truhi.net (Postfix, from userid 132)
id 5BB8510057D; Sat, 29 Jul 2017 11:35:05 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on truhi.net
X-Spam-Level:
X-Spam-Status: No, score=0.0 required=3.1 tests=HTML_MESSAGE autolearn=ham
autolearn_force=no version=3.4.1
Received-SPF: None (mailfrom) identity=mailfrom; client-ip=**.**.**.***; helo=a.**.com; envelope-from=dianne.l@*****.com; receiver=<UNKNOWN>
X-Greylist: delayed 319 seconds by postgrey-1.36 at truhi; Sat, 29 Jul 2017 11:35:04 EEST
Received: from a.**.com (mail.**.com [**.**.**.***])
by truhi.net (Postfix) with ESMTP id 0D6C4100164
for <x>; Sat, 29 Jul 2017 11:35:02 +0300 (EEST)
Received: by a.**.com (Postfix, from userid 33)
id 3075E922488; Sat, 29 Jul 2017 11:29:35 +0300 (IDT)
To: x
Subject: Enter our club as a lover
Date: Sat, 29 Jul 2017 11:29:35 +0300
From: "Dianne L." <dianne.l@*****.com>
Message-ID: <7fee________________________c316@www.*****.com>
X-Mailer: PHPMailer 5.2.23 (https://github.com/PHPMailer/PHPMailer)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="b1_7feee464828bc148486a4b82f280c316"
Content-Transfer-Encoding: 8bit