/grr, /arg ... on it.
Aloha, Michael. -- Michael J Wise Microsoft Corporation| Spam Analysis "Your Spam Specimen Has Been Processed." Got the Junk Mail Reporting Tool<http://www.microsoft.com/en-us/download/details.aspx?id=18275> ? -----Original Message----- From: mailop <[email protected]> On Behalf Of Tobi Sent: Thursday, November 15, 2018 10:08 AM To: mailop <[email protected]> Subject: Re: [mailop] Lot of bitcoin spam now from outlook.com servers?! Hi Mike we see this kind of scam for months. Some are better made and some are bad. We got the Cisco CVE scam as well. But what is new is that the crap now comes from a big one like outlook.com. Think they speculate on "outlook is too big to block" and using legit outlook.com servers gives the scam some more credibility :-) Just wonder if others see an increase in this kind of scam from big providers as well Have a good one tobi Am 15.11.18 um 18:32 schrieb Mike Hillyer: > The passwords on these generally will be legit. It's a somewhat clever use of > compromised account lists from one security breach or another. It certainly > adds a sense of credibility to such spam to see your password in the subject > line. I recently encountered one that tried a lot harder than previous > examples, but in doing so made it an even more obvious scam, because it tried > to tell me I was compromised via my Cisco router, when I don't have a Cisco > router. > > Mike > > > > Mike Hillyer > Email Infrastructure Specialist > email: [email protected]<mailto:[email protected]> > phone: 443-472-7226 > twitter: @mikehillyer > > > > -----Original Message----- > From: mailop <[email protected]<mailto:[email protected]>> On > Behalf Of Tobi > Sent: Thursday, November 15, 2018 12:12 PM > To: mailop <[email protected]<mailto:[email protected]>> > Subject: [mailop] Lot of bitcoin spam now from outlook.com servers?! > > Hi > > For the last couple of days we see a remarkable increase in bitcoin > (gotcha-watching-porn-scam) coming from legit outlook.com servers. The > subject mentions a username and a password. From what I see the PW could be > legit, at least they're not '1234' or 'password' > > Anyone else seeing such an increase in this crap coming from outlook.com > servers? > > Cheers > > tobi > > _______________________________________________ > mailop mailing list > [email protected]<mailto:[email protected]> > https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchill > i.nosignal.org%2Fcgi-bin%2Fmailman%2Flistinfo%2Fmailop&data=02%7C0 > 1%7Cmichael.wise%40microsoft.com%7C26316494694f433323ce08d64b2690ea%7C > 72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636779026344839510&sdat > a=azL8WMSywiITcVn%2FefmcjV%2FwvAEMGat3AcTQWs3FAXQ%3D&reserved=0 > _______________________________________________ mailop mailing list [email protected]<mailto:[email protected]> https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchilli.nosignal.org%2Fcgi-bin%2Fmailman%2Flistinfo%2Fmailop&data=02%7C01%7Cmichael.wise%40microsoft.com%7C26316494694f433323ce08d64b2690ea%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636779026344839510&sdata=azL8WMSywiITcVn%2FefmcjV%2FwvAEMGat3AcTQWs3FAXQ%3D&reserved=0
_______________________________________________ mailop mailing list [email protected] https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
