PushDo/Cutwail Spam Botnet bruteforce

Details of BNVL-2019-0022

What does the BNVL label mean?

BitNinja Server Security's BNVL identifiers are intended for use to identify publicly known information security vulnerabilities in publicly released software packages. This project was designed to collect and analyze attack information from the BitNinja network after cluster analyzis by the AI-powered Attack Vector Miner. More than 100 vulnerabilty types have been discovered with this project so far, so we decided to publish this platform to help keeping Linux server owners up-to-date.

Important! All listed BNVL vulnerabilities are protected by BitNinja PRO, so please check your configurations if your infrastructure is affected by any of them.

Syntax for BNVL labels:

BNVL prefix + Year + Arbitrary Digits

BNVL identifiers are free to use in any related security reports, web pages or e-mails.

Name: PushDo/Cutwail Spam Botnet bruteforce

CVE ID: (Not set)

Related links:

The attacking IP is infected with the PushDo/Cutwail Spam Botnet and tries to bruteforce SMTP. That idiosyncratic and invalid EHLO argument "ylmf-pc" is a known fingerprint of a widespread spamming botnet known as "PushDo" (and sometimes alternatively "Cutwail"). As shown in your transcript, it is mostly trying password guessing to authenticate and send mail through your server. Keeping it from sending spam to or through your server is easy, because of three characteristics: It actually sends the EHLO command before it receives the SMTP banner sent by the target MTA, a behavior that any modern MTA worth using (i.e. maybe not Exchange or QMail) can detect as a definitive indication of an unwelcome, pure-spam client. No legitimate SMTP client exhibits such "fast-talking" behavior, since it breaks basic SMTP functionality. The string "ylmf-pc" is not a valid EHLO argument, because it is not a fully qualified hostname or bracket-enclosed IP address literal. No legitimate SMTP client will ever use that argument. As with the fast-talk behavior, any decent MTA can be configured to reject mail from clients using an inherently invalid EHLO argument.

Incident volume (Last 14 days)