3CX DLL-Sideloading attack: What you need to know
Hello,
Our customer uses Sophos Central Email.
Unfortunately, he constantly receives emails from himself (fake sender).
How can we stop this from happening?
"To: info@****Subject: There is an overdue payment under your name. Please, settle your debts ASAP.Content-Type: text/plain; charset=ISO-8859-2; format=flowedContent-Transfer-Encoding: 8bitX-Sophos-MH-Mail-Info-Key: ******************************X-HE-Spam-Level: ++++++++++++X-HE-Spam-Score: 12.3X-HE-Spam-Report: Content analysis details: (12.3 points) pts rule name description ---- ---------------------- -------------------------------------------------- 2.4 DATE_IN_FUTURE_03_06 Date: is 3 to 6 hours after Received: date 0.4 RDNS_DYNAMIC Delivered to internal network by host with dynamic-looking rDNS 1.0 BITCOIN_EXTORT_01 Extortion spam, pay via BitCoin 0.0 PDS_RDNS_DYNAMIC_FP RDNS_DYNAMIC with FP steps 0.4 PDS_BTC_ID FP reduced Bitcoin ID 3.2 HELO_DYNAMIC_IPADDR Relay HELO'd using suspicious hostname (IP addr 1) 3.5 BITCOIN_SPAM_07 BitCoin spam pattern 07 1.4 BITCOIN_SPAM_02 BitCoin spam pattern 02X-SPAM-FLAG: YesX-HE-SPF: FAILED"
Hello Chriz,Thank you for reaching out to the community, please refer the following doc - Sender Checks: https://docs.sophos.com/central/Customer/help/en-us/ManageYourProducts/EmailSecurity/EmailSecurityPolicy/SenderChecks/index.html
Thanks & Regards,_______________________________________________________________
Vivek Jagad | Team Lead, Global Support & Services
Sophos Community | Product Documentation | Sophos Techvids | SMSIf a post solves your question please use the 'Verify Answer' button.