On Tue, Aug 19, 2025 at 07:52:32AM -0500, Jarland Donnell via mailop wrote:
> Suppose I forgot to add the most important detail between 3 & 4:
> 
> - Flood freemail accounts with massive amounts of inbound email all
> addressed from randomly generated addresses @ the domain with MX set to the
> target server.

Possibly unrelated, but I saw something vaguely similar a few months back when
a small number of hosts tried to relay whatever it was to a few addresses in
the @qq.com domain using a large subset of the published imaginary friends
as the from address. That got them only an entry in the blocklist of course,
given our spamd.alloweddomains setup.

We also see idiocy like 
https://nxdomain.no/~peter/to_jacksb841_at_gmail_dot_com.txt
where they seem to be trying a joejob of sorts.

Then again, if the relay they're abusing is not yours, this will be only 
anecdotal 
noise to you.

Here's hoping they're found and bashed thoroghly!

All the best,
Peter 

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://nxdomain.no/~peter/blogposts https://nostarch.com/book-of-pf-4th-edition
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to