Answer the question
In order to leave comments, you need to log in
Attack on the mail system, the first wave is repulsed, what's next?
At the beginning of the week, an attack began on the organization's mail system running on ZCS. The main vector is the selection of the password of several accounts through IMAP. Zimbra has a built-in mechanism - after several unsuccessful login attempts, the account is blocked for a certain time in order to slow down the attacker. However, such blocking hits employees.
We began to look at how large the set of addresses from which the attack is being carried out. It turned out to be large, so individual locks are not an option. As a result, a single new connection forward rule for WAN-DMZ has turned into several:
Answer the question
In order to leave comments, you need to log in
In a similar situation, fail2ban helped, and block on three unsuccessful attempts. A very effective measure.
Option 1 - VPN to the network and mail only after VPN
Option 2 - certificates (in the sense of checking a personal certificate)
Option 1 is technically simpler - VPN is installed and configured once. True, if you do a normal VPN, it should not be PPTP, you may need to install a client
Option 2 is technically more difficult, but it doesn't care about IP from the word at all - the "friend or foe" check is based on the presence on the device of a certificate issued by a corporate CA. True, the problem is that not all mail clients have the ability to work with S / MIME in general, and not all of them work with personal certificates. Well, the publication of CRL, the issuance of new employees, the recall of those fired - there will be a lot of fuss. But don't care - static IP, dynamic IP, the main thing is that port 500/4500 is not blocked (not all clients support an arbitrary port)
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question