On 01/08/2019 03:41 PM, Grant Taylor via cctalk wrote: > On 01/08/2019 01:25 PM, John Rollins via cctalk wrote: >> That they found an address used only for a certain mailing list makes >> it more interesting. Doing a quick Google search it looks like the >> list archives can be searched through, and while the addresses appear >> to be slightly obfuscated using “at” instead of “@“, it’s feasible >> that the address was picked up by a random email address scraping of >> web data. > > I've wondered if some unscrupulous person has subscribed to the list > so that they can receive a steady stream of email addresses that they > can potentially send spam / phishing emails to. > > I don't remember ever getting one of these types of messages. So I > can't comment about them with anything other than 2nd (or more) hand > knowledge. Though I run fairly tight anti-spam / anti-virus > configuration on my server. > > I would actually be interested in seeing full messages source, > including headers, for some of the messages. (If anyone is willing > and interested in sharing.) >
I to have received that phishing attempt many times. Its actually funny. The password given is three yahoo (groups) hacks ago (about 10 years) but the email address used was a public one way reflector (arrl.net). So all and all its a crude phishing attempt. I write down old passwords to keep from reuse and I use long mixed ones. So I know it was from that and meaningless. The source is useless as the address is a bogus hack as well. Same claims of rude and crude caught off the camera save for the systems use never had one or are blocked/disconnected(laptops) and at best a stupid threat. I run linux on multiple flavors/platforms so typical M$ hacks don't fly either. I was tempted to buy the smallest bitcoin possible maybe 0.1 cent (1 milliDollar) for laughs and send that as they deserve the very least for a dumb hack. Ignore the phoolz and if the password matches current change it consider changing them periodically. A=
