The Bizarre Incident Involving Microsoft Exchange Hosted Services

The probable sequence of events starts some time before November 23rd, 2006, when one of the sysadmins at the place where the web server was hosted chooses to do some testing, and creates a user called test1, and chooses a guessable (or at least bruteforceable) password for that user.

Quite predictably, a third party cracks the test1 user's password and on November 22, 2006 installs a PayPal phiskit, which is then spamvertized. Click the link below for a screenshot of what the phising site looked like in a typical browser:

Screenshot of test1's PayPal phishkit

The phishkit was installed under the cracked user's home directory, most likely because that's the only access they got.

Fortunately by the next morning, we received notices of the phishkit from people who have read the spam message, and at about ten AM Norwegian time the phishkit was preserved as evidence and removed. The complaint we filed the next day with the police is as far as I know still in queue for investigation.

Around December 7 or 8, 2006, the data which caused datadok.no mail to be blocked, or “quarantined” in Microsoft terminology, by Microsoft Exchange Hosted Services' built in filtering entered the system which processes incoming mail for this customer we unfortunately have in common with Microsoft.

Debugging the problem took some days, as described in my initial writeup, and in fact my attempt to send the writeup to several Microsoft addresses bounced with a message to reduce the spamminess of the message I was trying to send.

After a longish and rather information free exchange with various Microsoft people, Microsoft's final answer arrived on January 10, 2007, saying essentially that their system was working correctly and any information about how their system works were off-limits as trade secrets.

This irritated me enough that I contacted various journalists, producing a Computerworld.no article which appeared in their web edition on January 12 and in their print edition on January 15.

To my knowledge, Microsoft still considers this to be a case of valid classification.

Unbelievably, this all happened while I was preparing a presentation about malware and spam which I rewrote to fit the format of a paper for the BSDCan conference. The paper is be available from the conference site and from here (PDF, 880 kB - an updated version, made for the UKUUG Spring 2008 conference in March 2008 is available here, with a slightly updated version available here).


Peter N. M. Hansteen

(and to prove that I'm a complete click whore, here's picture of a blonde chick with a cute pussy - likely one of the most frequently viewed images on teh intarwebs.)




Last modified: Thu Feb 19 09:58:47 CET 2009