ietf-822
[Top] [All Lists]

RHijacked Addresses

2002-08-01 01:39:31

This message, which I got recently, shows how some people
react to what is happening around us. What is our responsibilities
as standards developers for allowing this to happen?

At 00:01 -0700 02-07-31, Adventive Editor wrote:
I've a question I hope you can help find an answer to.
I own a well traveled web site. Over the course of the last few
months, someone has been sending virus laden emails using our email
address. They have even gone so far as to create aliases that are
not ours. The problem is neither our computers, not the mail server.
Our hosting company has checked everything on their end, as we have
also checked everything on our end. Someone knows a way of sending
emails that appear to have originated from our server.

It would be an understatement to say these hoax emails have damaged
our business, integrity, income, and professionalism. They have even
dashed our hopes of creating a newsletter for our visitors.

Now the question. Are there detectives dedicated to investigating
this type of Internet problem? Also, how is it that a hacker can use
the email address belonging to someone else's domain without access
to their email hub? What can be done to prevent this practice?

I handle all my mail in a rather odd manner. All mail is forwarded
to an AOL account for action. All responses to inquiries are
answered from the AOL account. Absolutely none are generated from
our ISP mail address. In 4+ years, we haven't used it once. That's
the reason I know with absolute certainty someone else is using our
address. This plus the false aliases they use.

--
Jacob Palme <jpalme(_at_)dsv(_dot_)su(_dot_)se> (Stockholm University and KTH)
for more info see URL: http://www.dsv.su.se/jpalme/

<Prev in Thread] Current Thread [Next in Thread>