0

Is there a way to scan POP3 e-mails for certain domains / keywords assuming user/passwords are known? Our company would like the ability to know if suspicious e-mails are being sent, such as e-mails to/from employees of competitors (particularly if they contain attachments), or e-mails that contain certain internal terminology that should never be sent via e-mail.

All of the POP3 accounts are set to keep e-mails for at least a few days, and we know all users' passwords and usernames, so this doesn't need to be a proxy ... just something that can download and somehow filter/flag.

voretaq7
  • 79,879
  • 17
  • 130
  • 214
Beep beep
  • 1,833
  • 2
  • 18
  • 33
  • 5
    `we know all users' passwords and usernames` <-- AIEEEEE! MAJOR SECURITY NO-NO! As a sysadmin you should never have access to cleartext passwords. (You can ask over on the [security](security.stackexchange.com) site for the long version of Why) – voretaq7 Aug 10 '12 at 22:39
  • **Our company would like the ability to know if suspicious e-mails are being sent** and **we know all users' passwords and usernames** don't really go together. Just sticking to the problem you're trying to solve and ignoring how much of a bad idea that is anyway, how do you prove who sent what? Say DJPon3 was it you who sent the secrets of our business to our competitor? No, it was Jess. Look, they know my username and password and everything, and even admitted to it on a public site like serverfault.com. Who knows who else they told and who knows who did what with this account, any more? – Rob Moir Aug 10 '12 at 23:01
  • Our users do not know their passwords. The passwords are set up in Outlook by one of our system administrators, and only a few of us on the tech team know them. – Beep beep Aug 12 '12 at 13:47

2 Answers2

5

Sure, you can do this -- Log in to each mailbox and scan for your competitor's names in the mail contents. You would probably be best off writing a script to do this (you don't tell us what OS or mail software you're using, but there are some good POP3 Perl modules you could use on pretty much any platform. Honestly you want to do this on the server rather than wasting bandwidth though).


Having said that, Why Bother?
Unless you are going to lock your network down to the point of being unusable for anything outside a fixed and limited set of tasks there is really nothing you can do to stop a determined mole from exfiltrating data. You should concentrate instead on analyzing the activity of a specific employee who is suspected, to gather evidence to be used in court.

Long story slightly shorter: Corporate Security is hard.
If you can't trust your users, at least to the point where you only do targeted investigations, all is lost.

(You can pretty much skip reading everything between the next two bars, it's just illustrative hyperbole :)


Let's look at some of the avenues that you would have to address to really secure your environment and make sure you "catch" everything.

First off, you mentioned word-based content filters looking for internal terminology that should never be sent via e-mail. Content filters pretty much universally SUCK, so unless your internal terminology is SO specific that nobody will ever use it in normal conversation you may want to scratch this idea. If you keep it around, see below about encryption and steganography.

So next thing to thing about: what happens if your users log in and delete the messages before you see them your detection system is broken.
To mitigate this you could set up a shadow copy of all the email your company sends, or you could scan your mail server logs to look for suspicious To: domains. (Ideally it's better if you scan the whole email, but that would require a mail-scanning server in the middle of the path somewhere, or the shadow copying I just mentioned).

Of course this all falls down if your users' contacts are smart enough to use gmail, or their home address, or something else you won't associate with your competitors.
You could block those domains of course, but blacklisting never works. You would have to whitelist domains that your users are allowed to send to, and then the one day they have to respond to Big Important Client's CEO who happens to be using his home email account that day and can't the whitelisting idea will be thrown out the window.
How do I know? I've seen it happen.

Next let's consider circumvention (and the possibility that your users are not idiots):
First there's the easy one: Encryption. If they exfiltrate sensitive data as an encrypted .zip file you won't know what's in it. Easy fix though -- ban .zip files!

The same problem exists for encrypted PDFs. Or PDFs that contain images of scanned sensitive documents (or screen captures, or anything else that's not easy to scan algorithmically) though (the latter, steganography, is hiding information in plain sight. Your text-scanning won't know what's in an image after all).

...So to address this completely we're getting to the point of having to ban all attachments -- that's obviously a no-go, your boss would pitch a fit.

Let's assume however that you find a way around all of the above. Is it possible for your users to open a connection to an outside system on an arbitrary port?
Nothing in the world says SMTP has to be run on port 25 -- your users could connect to a stealth mail server outside the company on port 80 and get data out that way.

If you cover that avenue, what if they use {gmail, hotmail, Toby's FreeMail, Their home ISP's webmail} to send the message out via HTTP? Or HTTPS (where you can't scan the request body for stuff that should be confidential)?

Now we're getting to the point now where all external network activity has to be curtailed except for a narrowly defined list of allowed services (sites + ports) -- How badly will that cripple your business?

But OK, say the boss is really worried about security and tells you to lock it down. We've now reduced your network to the point where all you can do is browse the company's intranet. GREAT! The users are miserable, but the data is safe, right? We won!
NOPE! We've just looked at email (and a little bit of HTTP). Say, is that a USB drive there on your keychain?


voretaq7
  • 79,879
  • 17
  • 130
  • 214
  • 1
    "Exfiltrate"... I'll have to make a note of that word and make a point of using it in everyday conversation. – Ward - Trying Codidact Aug 11 '12 at 05:21
  • 1
    In addition to this answer, I think it should be noted that a lot of anti-spam/mail filtering appliances copy the emails sent through them, which makes it a lot easier to scan email for undesired content, but for this purpose, it's only going to catch the very stupid, because anyone with half a brain wouldn't use the company mailserver to do this kind of thing. (But yes, I've seen full email logging catch a very stupid person or two.) – HopelessN00b Aug 14 '12 at 19:55
0

There are products that do this without having a big hole in security. One example is Symantec Mail Security but there are others. Many companies require this for compliance with various legal policies internally of legislated.

From the Symantec Mail Security Web Page "Advanced Content Filtering protects sensitive information using pre-defined policies, regular expressions, attachment criteria, True File typing, and more. Active Directory based enforcement simplifies policy management"

Symantec also offers a dedicated data loss prevention product Symantec DLP A quick search for data loss prevention should find several to evaluate.

Dave M
  • 4,514
  • 22
  • 31
  • 30