Hi,
A few day ago we received an abuse report from a remote site
regarding receipt of email spam from one of our IP addresses.
After sniffing outbound port 25 traffic for a few seconds it was
obvious that the spam run was ongoing, so the customer's access to
TCP port 25 was firewalled off and they were informed.
The customer managed to track down the spam to Wordpress, but
unfortunately no further details are known as to the exact way that
the application was exploited. The customer has since reinstalled
their VPS without reinstalling Wordpress.
Cheers,
Andy
About this email:
https://tools.bitfolk.com/wiki/Security_incident_postings
--
http://bitfolk.com/ -- No-nonsense VPS hosting
<Eyecon> freecycle is for dating single mothers