On Thu, 07 Jun 2012 12:41:53 -0500
Ben Kamen <[email protected]> wrote:

> Has anyone else seen an increase since the breach?

Not really.  But interestingly, I've seen a few emails to my theoretically
secret former LinkedIn address.  These are in my logs from before
the breach was disclosed... could it be that the breach actually happened
a month ago?

May 11 16:33:44 colo3 CanIt[29042]: q4BKXhXA027488: Replacing locked
address [email protected] with private address
[email protected]

May 11 16:33:45 colo3 sm-mta[27488]: q4BKXhXA027488:
from=<[email protected]>, size=780, class=0, nrcpts=1,
msgid=<[email protected]>, proto=SMTP,
daemon=MTA, relay=[89.123.28.82]

May 11 16:33:45 colo3 CanIt[20530]: q4BKXhXA027488: what=greylisted,
stream=default, city=Timisoara, country_code=RO, detail=post-data,
nrcpts=1, relay=89.123.28.82, [email protected],
subject=%3D?iso-8859-1?Q?Start_winning_big_with_our_generous_welcome_bonus_at_Dice?%3D%09%3D?iso-8859-1?Q?_Stars_Casino!?%3D

May 11 16:33:45 colo3 sm-mta[27488]: q4BKXhXA027488:
to=<[email protected]>, delay=00:00:00,
pri=30780, stat=<[email protected]>... First-time sender
tempfailed as anti-spam measure; please try again in 60 minutes

Interesting how that leaked out...

Regards,

David.
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to