/grr, /arg ... on it.

Aloha,
Michael.
--
Michael J Wise
Microsoft Corporation| Spam Analysis
"Your Spam Specimen Has Been Processed."
Got the Junk Mail Reporting 
Tool<http://www.microsoft.com/en-us/download/details.aspx?id=18275> ?



-----Original Message-----
From: mailop <[email protected]> On Behalf Of Tobi
Sent: Thursday, November 15, 2018 10:08 AM
To: mailop <[email protected]>
Subject: Re: [mailop] Lot of bitcoin spam now from outlook.com servers?!



Hi Mike



we see this kind of scam for months. Some are better made and some are bad. We 
got the Cisco CVE scam as well. But what is new is that the crap now comes from 
a big one like outlook.com.

Think they speculate on "outlook is too big to block" and using legit 
outlook.com servers gives the scam some more credibility :-)



Just wonder if others see an increase in this kind of scam from big providers 
as well



Have a good one



tobi





Am 15.11.18 um 18:32 schrieb Mike Hillyer:

> The passwords on these generally will be legit. It's a somewhat clever use of 
> compromised account lists from one security breach or another. It certainly 
> adds a sense of credibility to such spam to see your password in the subject 
> line. I recently encountered one that tried a lot harder than previous 
> examples, but in doing so made it an even more obvious scam, because it tried 
> to tell me I was compromised via my Cisco router, when I don't have a Cisco 
> router.

>

> Mike

>

>

>

> Mike Hillyer

> Email Infrastructure Specialist

> email: [email protected]<mailto:[email protected]>

> phone: 443-472-7226

> twitter: @mikehillyer

>

>

>

> -----Original Message-----

> From: mailop <[email protected]<mailto:[email protected]>> On 
> Behalf Of Tobi

> Sent: Thursday, November 15, 2018 12:12 PM

> To: mailop <[email protected]<mailto:[email protected]>>

> Subject: [mailop] Lot of bitcoin spam now from outlook.com servers?!

>

> Hi

>

> For the last couple of days we see a remarkable increase in bitcoin

> (gotcha-watching-porn-scam) coming from legit outlook.com servers. The 
> subject mentions a username and a password. From what I see the PW could be 
> legit, at least they're not '1234' or 'password'

>

> Anyone else seeing such an increase in this crap coming from outlook.com 
> servers?

>

> Cheers

>

> tobi

>

> _______________________________________________

> mailop mailing list

> [email protected]<mailto:[email protected]>

> https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchill

> i.nosignal.org%2Fcgi-bin%2Fmailman%2Flistinfo%2Fmailop&amp;data=02%7C0

> 1%7Cmichael.wise%40microsoft.com%7C26316494694f433323ce08d64b2690ea%7C

> 72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636779026344839510&amp;sdat

> a=azL8WMSywiITcVn%2FefmcjV%2FwvAEMGat3AcTQWs3FAXQ%3D&amp;reserved=0

>



_______________________________________________

mailop mailing list

[email protected]<mailto:[email protected]>

https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchilli.nosignal.org%2Fcgi-bin%2Fmailman%2Flistinfo%2Fmailop&amp;data=02%7C01%7Cmichael.wise%40microsoft.com%7C26316494694f433323ce08d64b2690ea%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636779026344839510&amp;sdata=azL8WMSywiITcVn%2FefmcjV%2FwvAEMGat3AcTQWs3FAXQ%3D&amp;reserved=0
_______________________________________________
mailop mailing list
[email protected]
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to