•News Center
 •This Week
 •From US
 •Register Now
 •About Us
 •Advertising Info
 •Nikkei BP Group

Advanced Search

(Japanese Site)

  • MITI Mail Server Used to Relay Overseas Junk Mail
  • March 3, 1998 (TOKYO) -- Japan's Ministry of International Trade and Industry (MITI) revealed that its mail server was the target of relay abuse in late January from someone overseas.
    The originator of the bulk email, also known as "spam," allegedly used the ministry as a relay server to send out mail for advertising and solicitation purposes. MITI immediately announced that a spamming incident had occurred and took anti-abuse measures 10 days after the discovery.

    According to an informed source within the ministry, on Jan. 20 MITI's system administrator discovered a problem on the mail server. A large quantity of mail was waiting in the outbound queue. >From the mail addresses it appeared that none of the recipients was in any way related to MITI. On checking the transmission log, it was found that more than 200 dubious messages had already been forwarded.

    The following day, on Jan. 21, more than 10 complaint messages were posted to the Web master of MITI's Web pages. All the complaints were in English and stated that spam had been received through MITI.

    According to the MITI informant, two types of spam were forwarded through the ministry. One was a money-making scheme promoted by a broker, and the other was an advertisement for spamming software. Both types of spam originated overseas.

    Most of the mail users who sent complaints expressed disbelief that MITI could be involved in such advertising or solicitation, and wanted an explanation as to how the incident occurred.

    One of the complaints was from an Internet service provider outside Japan. In a strongly worded message, the ISP said that "in the future, we will not relay any mail received via MITI."

    Users in Japan were also among the spam targets. An invitation to contact MITI, carried on its Web site, elicited a complaint from within Japan. A spam victim also made a report to the Japan Computer Emergency Response Team Coordination Center (JPCERT/CC), an organization that provides information about incidents of illegal access to computer systems.

    On Jan. 23, MITI announced on its Web site that the spam contents had nothing to do with the ministry. On Jan. 25 the vendor in charge of MITI's computer system took preventive measures. The mail system was set up so that no mail received from the three addresses that spawned the spam would be relayed in the future.

    However, this fix was hardly a radical solution, since it could only block mail from the recent spam culprits. Consequently, on Jan. 30, MITI upgraded to the latest version of the mail server software "sendmail" and configured its server to reject all relay mail unrelated to MITI.

    As a result of the "sendmail" upgrade, MITI has apparently succeeded in blocking several hundred spam messages since the beginning of February.

    There is no apparent reason why MITI's mail server came under attack. MITI sent a letter of protest to the broker's facsimile number given in the "get rich" spam, but got no response.

    MITI also sent email requests asking the ISP closest to the spam origins not to relay spam. The reply received from that ISP stated that in future it will not relay mail from the parties who sent the spam, according to MITI.

    (Nikkei Computer)

    Copyright © 1997-98
    Nikkei BP BizTech, Inc.
    All Rights Reserved.
    Updated: Mon Mar 2 18:15:02 1998