it sounds to me like you have one or more infected websites or someone is abusing an email account to sent out spam. Limiting outgoing mail won't stop a spammer from using a hack he uploaded to a website.
Here are some things you can do to find the hacked sites and clean them:
- make sure all scripts like wordpress (and plugins/themes), joomla, drupal, etc... are up-to-date
--> you can use the wordpress module in plesk for wordpress but always make a good backup before you let automated scripts make changes.
- clean wordpress infected sites with wordpress scan plugins
- scan the sites with something like maldet
Here are some things that imho should always be on a server as part a standard security policy. Its always better to stop a hacker before he had a change to abuse a website
- install and configure maldet so you get an early warning when some hackers are at it again
- install clamav to extend the search range of maldet
- extend clamav with extra defenition files
- enable mod_security in plesk
- enable fail2ban in plesk
Actions to take before and after a spam attack
- test if your server is on blacklists
- have a good policy towards your clients about spam and updating websites, don't be afraid to disable a site if people are persistent in not updating there sites.
links to various sites
- scamp (clamav definitions script)
http://sourceforge.net/projects/scamp/
maldet
https://www.rfxn.com/projects/linux-malware-detect/
blacklisttest
http://multirbl.valli.org/
disclaimer: this works when the mailserver is qmail, i have no idea how to do this with postfix, maybe its the same, maybe not, someone else please comment on this.
There is also the posibility is that a user has a virus on there computer that steals passwords and the hackers are using there legitemate login/password combination to send mails. You can find this by filtering the maillog on these phrases
first "auth_smtp"
then on start filtering the various logins you see
"smtp_auth: smtp_auth: SMTP user
[email protected]"
If some is abusing a stolen password you will see a lot of these
May 7 11:20:28 res1 smtp_auth: smtp_auth: SMTP user
[email protected] : logged in from (xxx)@(xxx) [xxx.xxx.xxx.xxx]
The logins will come from ip addresses all over the world. If you have 3 logins within a minute from india, russia and brazil, its a pretty good sign that account is hacked.
I use the log module in webmin to do these filters. Maybe not geek-like enough for some, buts pretty fast and handy.
i hope this has given you some ideas and directions where to look and i hope you find the spammer.
regards
Jan