{"id":23193,"date":"2020-12-09T10:00:37","date_gmt":"2020-12-09T02:00:37","guid":{"rendered":"https:\/\/web.mwwsb.com.my\/pjci\/?post_type=kb&#038;p=23193"},"modified":"2023-05-25T11:33:31","modified_gmt":"2023-05-25T03:33:31","slug":"security-tips-compromised-mailbox","status":"publish","type":"kb","link":"https:\/\/www.casbay.com\/guide\/kb\/security-tips-compromised-mailbox","title":{"rendered":"Security Tips: Compromised Mailbox"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"23193\" class=\"elementor elementor-23193\" data-elementor-post-type=\"kb\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c9d709 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c9d709\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a78f61d\" data-id=\"a78f61d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c6a007 elementor-widget elementor-widget-heading\" data-id=\"5c6a007\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Tips: Compromised Mailbox<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2527a43 elementor-widget elementor-widget-image\" data-id=\"2527a43\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/casbay.com\/guide\/wp-content\/uploads\/2021\/02\/email-security-concept-700px.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29ae651 elementor-widget elementor-widget-text-editor\" data-id=\"29ae651\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Here are some symptoms of a compromised mailbox that you should know:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b793fe elementor-widget elementor-widget-heading\" data-id=\"7b793fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Symptom 1: Receiving bounce back messages for the emails that you didn\u2019t send.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7907dd7 elementor-widget elementor-widget-text-editor\" data-id=\"7907dd7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This also means a spammer is <a href=\"https:\/\/support.intermedia.com\/app\/articles\/detail\/a_id\/24929\/type\/KB\" rel=\"noopener\">spoofing\u00a0<\/a>your email address. In other words, a spammer is sending an email with your email address in the <strong>From.<\/strong>\u00a0If a message gets returned to the sender, it goes to the actual holder of the\u00a0<strong>From\u00a0<\/strong>address, regardless of who sent it. However, you can contact support to perform message tracking. This allows you to make sure that the messages were not sent from your mailbox.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c77f33 elementor-widget elementor-widget-heading\" data-id=\"9c77f33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Symptom 2: Others are receiving emails from you (that you didn\u2019t send).<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cfa003 elementor-widget elementor-widget-text-editor\" data-id=\"5cfa003\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>There is a common scenario when the messages in question are not present in the <strong>Sent items<\/strong> folder. This is because the hacker already deleted them. As outlined in the previous step, you can contact support for message tracking.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-990345f elementor-widget elementor-widget-heading\" data-id=\"990345f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Symptom 3:Some emails are deleted or moved to a different folder.\u00a0<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78ce47a elementor-widget elementor-widget-text-editor\" data-id=\"78ce47a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This might indicate that the hacker has moved the emails manually or mailbox rules were created that moved the messages.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ee6b61 elementor-widget elementor-widget-heading\" data-id=\"8ee6b61\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Symptom 4: Mail forwarding has been added.\u00a0<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0865d3b elementor-widget elementor-widget-text-editor\" data-id=\"0865d3b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>One of the common tactics that hackers use includes setting up email forwarding via Outlook rule. This is due to its immunity to typical responses like resetting users\u2019 passwords.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78cfe81 elementor-widget elementor-widget-heading\" data-id=\"78cfe81\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to prevent a compromised mailbox:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a223aa elementor-widget elementor-widget-text-editor\" data-id=\"4a223aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>To prevent a compromised mailbox that will cause unauthorized spamming, we would advise all the hosting &amp; server owners to be vigilant of trojans and malware. They may be injected into their hosting.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da5dd8c elementor-widget elementor-widget-heading\" data-id=\"da5dd8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What you need to do:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9ef5e7 elementor-widget elementor-widget-text-editor\" data-id=\"c9ef5e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Firstly, change the mailbox login password immediately. You will need to change it to a more complicated password consisting of numbers; symbols and upper and lower case letters.<\/p><p>Secondly, scan those Computers that you use to connect to the mailbox. You can connect via <a href=\"http:\/\/windows.microsoft.com\/en-MY\/windows\/products\/security-essentials\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-wpel-link=\"external\"><strong>Microsoft Security Essentials<\/strong><\/a> and update their Windows Security to the latest release (for Windows users). Also, do not forget to do the necessary anti-virus scanning as well.<\/p><p>Next, update all website apps and CMS (Content Management System, such as WordPress&amp; Joomla) and third-party applications for the hosting immediately. Some malware and trojans can get into hosting through these loopholes.<\/p><p>Lastly, if you require any further assistance, please do not hesitate to contact us. Thank you.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security Tips: Compromised Mailbox Here are some symptoms of a compromised mailbox that you should know: Symptom 1: Receiving bounce back messages for the emails that you didn\u2019t send. This also means a spammer is spoofing\u00a0your email address. In other words, a spammer is sending an email with your email address in the From.\u00a0If a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"kbtopic":[49],"kbtag":[106],"mkb_version":[],"_links":{"self":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb\/23193"}],"collection":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/comments?post=23193"}],"version-history":[{"count":12,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb\/23193\/revisions"}],"predecessor-version":[{"id":38254,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kb\/23193\/revisions\/38254"}],"wp:attachment":[{"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/media?parent=23193"}],"wp:term":[{"taxonomy":"kbtopic","embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kbtopic?post=23193"},{"taxonomy":"kbtag","embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/kbtag?post=23193"},{"taxonomy":"mkb_version","embeddable":true,"href":"https:\/\/www.casbay.com\/guide\/wp-json\/wp\/v2\/mkb_version?post=23193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}