Hi chrysalis
Many thanks but sorry, I do not nor have any access to kitz platform/server/services sorry
I know how ISP/Hosting platforms should be setup, and I know kitz host, so they will be setup to a high degree as all platforms are, and will be systematically tested for rootkits (ours certainly are). Vp
Vps servers are very highly segmented to each vps, with monitoring on resources to attempt to stop any 1 (or more) vps from bringing the server/platform down.
Please understand, as with everything, there could be new attack vectors which are unknown, so we never say 100%, just as users on their computers cannot 100% state they have never been/are currently infected, or can be 100% sure where any spam emails may have been sourced.
Headers would be good but this would only show where the emails have originated (yes headers can be stripped/manipulated but the headers on the email can only be stripped on the sending server - if a spammer has setup their own smtp server - however, the receiving server would add their headers in, which the spammers cannot manipulate, so the original sending details remain on many aspects of details)
As I said, with only 1 report of spam (other reports have looked into as per thread) then it is very unlikely to be connected with kitz if you have every dealt with this issue or similar, they do not just use 1 or even 5 email addresses (if harvested), it's usually all as a one shot before it's highlighted and on most hosted platforms, it happens very quickly.
I hope that helps and explains a little more of possibilities/reasons
Many thanks
John