PushDo/Cutwail Spam Botnet bruteforce

Details of BNVL-2019-0022

What does the BNVL label mean?

BitNinja Server Security’s BNVL identifiers are intended for use to identify publicly known information security vulnerabilities in publicly released software packages. This project was designed to collect and analyze attack information from the BitNinja network after cluster analysis by the AI-powered Attack Vector Miner. More than 100 vulnerability types have been discovered with this project so far, so we decided to publish this platform to help to keep Linux server owners up-to-date.

Important! All listed BNVL vulnerabilities are protected by BitNinja PRO, so please check your configurations if your infrastructure is affected by any of them.

Syntax for BNVL labels:

BNVL prefix + Year + Arbitrary Digits


Name : 
PushDo/Cutwail Spam Botnet bruteforce
Related Links: https://en.wikipedia.org/wiki/Cutwail_botnet
                         https://serverfault.com/questions/667322/email-server-attack-from-telnet

CVE ID: Na

Description: 

The attacking IP is infected with the PushDo/Cutwail Spam Botnet and tries to bruteforce SMTP.

That idiosyncratic and invalid EHLO argument “ylmf-pc” is a known fingerprint of a widespread spamming botnet known as “PushDo” (and sometimes alternatively “Cutwail”). As shown in your transcript, it is mostly trying password guessing to authenticate and send mail through your server. Keeping it from sending spam to or through your server is easy, because of three characteristics:

It actually sends the EHLO command before it receives the SMTP banner sent by the target MTA, a behavior that any modern MTA worth using (i.e. maybe not Exchange or QMail) can detect as a definitive indication of an unwelcome, pure-spam client. No legitimate SMTP client exhibits such “fast-talking” behavior, since it breaks basic SMTP functionality.

The string “ylmf-pc” is not a valid EHLO argument, because it is not a fully qualified hostname or bracket-enclosed IP address literal. No legitimate SMTP client will ever use that argument. As with the fast-talk behavior, any decent MTA can be configured to reject mail from clients using an inherently invalid EHLO argument.

pattern: “HELO”: “ylmf-pc”