It is always unusual when some of the larger hosting companies generate too much spam, as you would expect them to have a stronger handle on it. Unified Layer has had many challenges over the last year, but we are seeing a new significant pattern emerging.
Over the last 2-3 days we see a significant increase of spam attempts from their networks.
50.87.248.60 1 box1060.bluehost.com 50.87.248.104 1 box1104.bluehost.com 50.87.248.126 2 box1126.bluehost.com 50.87.248.176 1 box1176.bluehost.com 50.87.248.221 1 box1221.bluehost.com 50.87.248.248 3 box1248.bluehost.com 66.147.240.95 2 host295.hostmonster.com 66.147.240.164 1 host364.hostmonster.com 66.147.240.173 1 host373.hostmonster.com 66.147.240.186 1 host386.hostmonster.com 66.147.242.162 1 box562.bluehost.com 66.147.242.181 1 box581.bluehost.com 66.147.244.68 2 box768.bluehost.com 66.147.244.114 4 box814.bluehost.com 66.147.244.153 2 box653.bluehost.com 66.147.244.187 1 box687.bluehost.com 66.147.244.192 2 box692.bluehost.com 66.147.244.217 1 box717.bluehost.com 66.147.244.223 2 box723.bluehost.com 66.147.244.242 1 box742.bluehost.com 69.89.31.84 5 box284.bluehost.com 69.89.31.105 1 box305.bluehost.com 69.89.31.124 2 box324.bluehost.com 69.89.31.132 1 box332.bluehost.com 69.89.31.133 2 box333.bluehost.com 69.89.31.149 3 box349.bluehost.com 69.89.31.168 1 box368.bluehost.com 69.89.31.174 2 box374.bluehost.com 69.89.31.178 4 box378.bluehost.com 69.89.31.189 4 box389.bluehost.com 69.89.31.195 2 box395.bluehost.com 69.89.31.214 1 box414.bluehost.com 69.89.31.217 1 box417.bluehost.com 69.89.31.220 1 box420.bluehost.com 69.89.31.225 1 box425.bluehost.com 69.89.31.238 2 box438.bluehost.com 69.195.124.51 2 box851.bluehost.com 69.195.124.65 2 box865.bluehost.com 69.195.124.70 3 box870.bluehost.com 69.195.124.90 3 box890.bluehost.com 69.195.124.133 4 box933.bluehost.com 69.195.124.140 1 box940.bluehost.com 69.195.124.167 2 box967.bluehost.com 69.195.124.176 1 box976.bluehost.com 69.195.124.253 1 box1053.bluehost.com 74.220.207.120 3 host120.hostmonster.com 74.220.207.147 2 host147.hostmonster.com 74.220.207.193 1 host193.hostmonster.com 74.220.215.63 1 host263.hostmonster.com 74.220.215.101 1 host301.hostmonster.com 74.220.215.238 3 host238.hostmonster.com 74.220.219.55 3 box455.bluehost.com 74.220.219.62 1 box462.bluehost.com 74.220.219.68 2 box468.bluehost.com 74.220.219.113 2 box513.bluehost.com 173.254.24.16 2 rsb16.rhostbh.com 173.254.24.17 1 rsb17.rhostbh.com 173.254.24.20 1 rsb20.rhostbh.com 173.254.24.21 1 rsb21.rhostbh.com 173.254.24.22 1 rsb22.rhostbh.com 173.254.24.25 1 rsb25.rhostbh.com 173.254.24.30 4 rsb30.rhostbh.com 173.254.24.32 4 rsb32.rhostbh.com 173.254.24.33 1 rsb33.rhostbh.com 173.254.24.34 3 rsb34.rhostbh.com 173.254.24.37 1 rsb37.rhostbh.com 173.254.24.42 1 rsb42.rhostbh.com 173.254.24.54 2 rsb54.rhostbh.com 173.254.28.14 1 just14.justhost.com 173.254.28.35 1 just35.justhost.com 173.254.28.85 4 just85.justhost.com 173.254.28.114 1 just114.justhost.com 173.254.28.117 1 just117.justhost.com 173.254.28.163 1 just163.justhost.com 173.254.28.172 1 just172.justhost.com 173.254.56.11 2 rsj11.rhostjh.com 173.254.56.12 2 rsj12.rhostjh.com 173.254.56.15 1 rsj15.rhostjh.com 173.254.56.17 1 rsj17.rhostjh.com 173.254.56.27 3 rsj27.rhostjh.com 173.254.56.34 4 rsj34.rhostjh.com
Now, interesting is that almost every IP is listed in ‘rwhois’ as being operated by different individuals on a /32 basis, so either this problem is a systemic issue with the environments, or these entries in the ‘rwhois’ are not accurate or false, and actually belong to one player.
We see lots of examples in the logs where the messages are being sent to invalid email addresses, using an apparent ‘bounce’, eg..
MAIL command received, args: FROM:<>
This means either the bounce is forged, or it might be real ‘back scatter’.
These are all Linux systems, and interestingly they are using modern methods of TLS when sending. We haven’t been able to locate a message to a legitimate email address, so this ‘might’ be some form of exploit where someone is using the Unified Layers servers as a way to do email address harvesting, but the servers all appear to be cPanel servers.
cPanel servers in general are not known for generating backscatter, so this is either an unusual situation with an unusual configuration, that allows for backscatter, or this is OS generated spam, pretending to be a bounce. Based on the fact that each email address is tried in succession five times, the later appears more likely.
And since all the servers have generic host names, it might be that they are ‘shared’ servers, except for the ‘rwhois’ delegations indicate they are dedicated servers. So probably simply servers that were never configured by their owners properly, eg a custom PTR record.
So, assuming the later, is there a network wide compromise operating on their networks? Or are these servers configured with a software that has a vulnerability, eg a plugin?