On Thu, 07 Jun 2012 12:41:53 -0500 Ben Kamen <[email protected]> wrote:
> Has anyone else seen an increase since the breach? Not really. But interestingly, I've seen a few emails to my theoretically secret former LinkedIn address. These are in my logs from before the breach was disclosed... could it be that the breach actually happened a month ago? May 11 16:33:44 colo3 CanIt[29042]: q4BKXhXA027488: Replacing locked address [email protected] with private address [email protected] May 11 16:33:45 colo3 sm-mta[27488]: q4BKXhXA027488: from=<[email protected]>, size=780, class=0, nrcpts=1, msgid=<[email protected]>, proto=SMTP, daemon=MTA, relay=[89.123.28.82] May 11 16:33:45 colo3 CanIt[20530]: q4BKXhXA027488: what=greylisted, stream=default, city=Timisoara, country_code=RO, detail=post-data, nrcpts=1, relay=89.123.28.82, [email protected], subject=%3D?iso-8859-1?Q?Start_winning_big_with_our_generous_welcome_bonus_at_Dice?%3D%09%3D?iso-8859-1?Q?_Stars_Casino!?%3D May 11 16:33:45 colo3 sm-mta[27488]: q4BKXhXA027488: to=<[email protected]>, delay=00:00:00, pri=30780, stat=<[email protected]>... First-time sender tempfailed as anti-spam measure; please try again in 60 minutes Interesting how that leaked out... Regards, David. _______________________________________________ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list [email protected] http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

