RE: Exchange 2k hacked

  • From: "John Tolmachoff \(Lists\)" <johnlist@xxxxxxxxxxxxxxxxxxx>
  • To: "'[ExchangeList]'" <exchangelist@xxxxxxxxxxxxx>
  • Date: Tue, 28 Oct 2003 12:46:26 -0800

If it is an event sink, you should be able to open up the files, as I
believe event sinks must use a .vbs, correct?


John Tolmachoff


eServices For You


-----Original Message-----
From: Mark Hippenstiel [mailto:M.Hippenstiel@xxxxxxxxxxxx] 
Sent: Monday, October 27, 2003 1:03 PM
To: [ExchangeList]
Subject: [exchangelist] Exchange 2k hacked

Today I had to resurrect an exchange 2k server that had relaying for
successfully authenticated hosts allowed. This wouldn't have been a problem,
had the user 'webmaster' had a password assigned :) I guess this was some
left-over from a previous Novell migration. Well. I cleared out half a
million spam emails.

What got to me was the presence of a process named unsecapp.exe which I have
not noticed running anywhere before. A quick google returns some references
to event sinks. Further, there have been various dcom errors, stating an
access error while starting a {3Dxxxx. application. All this could be
perfectly legit, but I want to make sure that this host has not been
tampered with. 

The exchange is running behind ISA and has only SMTP published. The SMTP
vuln had been fixed on the 24th I think. Any clues?


List Archives:
Exchange Newsletters:
Exchange FAQ:
Other Internet Software Marketing Sites:
Leading Network Software Directory:
No.1 ISA Server Resource Site:
Windows Security Resource Site:
Network Security Library:
Windows 2000/NT Fax Solutions:

Other related posts: