So it has happened. One of your users account was hacked, and its abused to send spam via it. Since these guys don't care about your systems health, your system is probably under heavy load right now. This is what best to do:
Since you want to be a nice guy to others, and don't want to end being enlisted on some RBL DNS stopping the outbound mailstack is the first thing to do. This is only possible via restarting citserver with a special environment varable set:
you could add this to i.e. /etc/init.d/citadel and restart citserver.
Remember this, since you have to remove it after the situation is cleared and you want to resume normal operations.
Now you closed the outbound floodgates, its time to close the inbound one. Most probably the spammer is sending mails in via SMTP. Closing the SMTP ports (25 / 465 / 587) via your firewall is a good idea, but you also can close them using webcit - Administration/ Edit site-wide configuration / SMTP → and now set MTA/MSA/SMTP + SSL to -1; Save it and restart citserver again. If you run another mailer in front of citadel, its probably a good idea to stop this one too. If you've got a secondary mx running on another host, stop it too. Now you're offline; which is not as bad as you may think; Remote systems will try to reach you again later and you won't loose mail which is sent to you by others.
This is probably a good time to tell your users that the mailsystem is unavailable, and you're working on the situation.
Now you need to find out whose account was hacked. therefore you need to inspect your outbound mailqueue.
As an aide user, Goto Administration / View the outbound SMTP queue/
The Jobs waiting for further processing: table shows you probably a huge list of mail jobs being processed. The Sender Column should show you who is the one that was hacked. Contact this person, and tell him he has to clear the situation on his system. Right now its probably a good idea to change his password.
And now you're in the need for a way to delete a huge number of jobs from the Queue, right? Since webcit dynamicaly decides which representation to provide for a room, and the mailqueue is just another (hidden) room, you simply need to chose another representation by changing the view parameter in the URL in your browser from 11 to 1 and press enter. Now you've got the compfy mailbox view, you will get a better view of the situation. There are two sorts of messages in this room: those with regular subjects, and those with QMSG as subject. its always pairs of them; the QMSG with the queueing information, and the regular mail. We assume that NONE of the mails currently in the Queue will be sent. Select all of them and press <del> to move them into your personal trashbin. You can later check, whether there are mails from your users that they should send again. Please note that you should respect the privacy of your users.
Now that you
- removed the spam from your mailqueue
- identified & cleared possible infections on the client host
you need to
- configure the new password on the client and tell the user his new password for the web login (or better let him choose a new one which mustn't be the old one)
- educate you user about possible attack vectors, and that his credentials are possibly burned, and he should change passwords on other accounts
- re-enable the inbound SMTP-Ports
- remove the outbound mailblock setting from your initscript
- restart citserver
- send a test mail!
- check whether you made it into some RBL, and clear the situation with them; else some remote hosts may reject mails from you as spam…