![]() ![]() Once we’ve cleaned out the spam scripts, we find out which web application vulnerability was used for the attack, and patch the application to prevent further infections.Įmail login compromises are comparatively easy to find. We look at the upload time, and code of these scripts to determine if they are spam scripts, and if yes, we delete them from the server. Here at Bobcares, we systematically analyze server event logs to locate the spam source.įirst we find out from the mail logs when the spamming started, and then we check the web logs to find our all script activations at that time. These scripts listen for commands from a remote “bot master” and send spam based on these commands.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |