Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Loading...
Loading...

ERRMSG: 3506 - Possible SMTP attack (MMReceiver errors)

Expand / Collapse


This article applies to:

  • Trustwave MailMarshal (SEG)

Symptoms:

Event ID: 3506
Type: Error
Source: MMReceiver
Description: Possible SMTP attack

Causes:

A connecting host has sent numerous unexpected SMTP commands.

If a connecting host issues many unexpected SMTP commands, it could be misconfigured, or it could be sending nonsensical commands repeatedly in an attempt to occupy connections or MailMarshal Receiver threads (a Denial of Service attack).

Generally "unexpected" commands in this context are repeated HELO, AUTH, HELP, RSET, NOOP, or VRFY commands.

Note: MailMarshal always replies to VRFY with "252 user appears to be valid". Outside applications cannot harvest address information using this command.

Actions:

This message is informational. If you see this message only occasionally, no action is required.

You may find that this message is logged repeatedly for a particular connecting host. If you are not receiving useful email from that host, you can choose to reject all connections from the host address. Use the Server and Array Properties > Blocked Hosts tab in the MailMarshal Configurator or Management Console.

Notes:

  • Before blocking a host, be sure that you do not receive valid email from it. Some email server software uses repeated SMTP commands, particularly the RSET command.
  • This message is not related to the MailMarshal DoS Attack Prevention feature. DoS Attack Prevention is triggered by excessive connection requests (not unexpected commands within a connection).

To contact Trustwave about this article or to request support:


Rate this Article:
     
Tags:

Related Articles



Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.