JMR Group2
JMR Group2
The below is a breakdown of the investigation into mail issues experienced currently at JMR Group
1. Mail “Spoofing”
2. SPF records
3. MX Records
4. Malware/Spyware
5. Email passwords
6. Mail security vendor
7. Domain computers
Mail “Spoofing”
I looked at the original email received by Vanessa. The headers, provides all the info regarding and email.
(where it came from, to who, what server was used etc.)
The headers provided me with the following information:
Sender: [email protected]
Recipient: [email protected]
Sending Server: AM0P193MB0434.EURP193.PROD.OUTLOOK.COM
Security: Authentication-Results: jmrgroup.co.za; dkim=none (message not signed)
The above seems to be correct and in line with expected results when looking at an email sent within the
company.
The security line is the one that seems to be an issue. The emails are not being digitally signed which
means the SPF records were not correct at the time or not working correctly.
We need to discuss this with the current mail provider and see if they can shed some light on why the SPF
records are not producing the correct results.
An Example of the correct result should be:
Authentication-Results: spf=pass (sender IP is ???.???.???.???) your domain; dkim=pass (signature was verified)
This may also be the result of a “spoofed” email, but I would have expected a different sending mail
server if this was the case.
SPF records
I have checked the SPF records and found the following:
jmrgroup.co.za text =
"MS=ms25024245"
jmrgroup.co.za text =
I am not sure what rocketseed.com is. I have included a URL for your information.
https://www.rocketseed.com
MX Records
Hetzner handles the MX records
primary name server = ns1.host-h.net
jmrgroup.co.za MX preference = 10, mail exchanger = jmrgroup-co-za.mail.protection.outlook.com
Malware/Spyware
Although the machines were scanned with a virus scanner, in this case ESET. Barend’s machine still has
the following vulnerability on the machine. I have deleted this file.
There may be a reason for the above being on the machine but Malware/Spyware uses torrents to
spread. The use of torrents should not be allowed with-in the JMR Group domain.
Email passwords
Email passwords is one of the best ways to protect your email. These should be at least 8 char long,
included numeric, special char and capitals. The default 365 password profile should be used if a proper
password policy is not in place.
Domain computers
All computers should be included in the domain configuration, which will help maintenance and support. I
know there is some computers, which are not part of the domain, which means they do not get the
domain policies that could lead to “un- protected” machines.
Members: JC Kruger, R Crichton
Fees
It is very difficult to provide timelines and pricing to get all of the above setup “correctly”. I suggest we
work on a normal T/M basis. Most of the issues could be resolved by Sebastian, which may need some
input for us but does not require us to be onsite for extended periods.
I am also of the opinion that the infrastructure should be looked into as a whole and not just a portion i.e.
JHB branch, the reason is that “un-protected” access to the system could compromise all the good work
done in JHB.
Regards
Jacob Kruger