On 3/22/2020 4:41 PM, Chris via mailop wrote:
It's been my experience that MOST of them are going to be red-herrings
+1
2 days ago, I got one of these for a domain for which I host email. I
checked the SHA-1 hash against the current password's SHA-1 hash, and it
didn't match. So it seemed
Does anyone have a contact to the admin/postmaster of Nova.org? if so, could
you private message me as soon as you can? Thanks in advance!
Thanks,
Dickie LaFlamme
Senior Deliverability Specialist
dickie.lafla...@oracle.com
___
mailop mailing list
On 2020-03-22 16:20, Nick Stallman via mailop wrote:
I got one of these the other day and I'm scratching my head about it as
what's in the report cannot possibly be correct.
The report was for a domain we host the website for, but the domain has
no email at all.
The account referenced is also
I got one of these the other day and I'm scratching my head about it as
what's in the report cannot possibly be correct.
The report was for a domain we host the website for, but the domain has
no email at all.
The account referenced is also not a valid website login or anything
else I can
On 22 Mar 2020, at 10:28, Steve Freegard via mailop wrote:
Abuse reports shouldn't have to be opt-in.
True, but these are not abuse reports to an empowered party, but rather
to possible victims.
It's akin to the FUSSPs that use mail-based challenge/response models or
to SMTP callback
Steve,
> >I am not impressed.
>
> Sorry about that Atro.
Having witnessed what I have today, I have to say I think your concept
is inherently flawed.
Also, my handful-of-dozen spams of this type are apparently a drop in
the ocean when compared to some of the more serious spamtrappers who
claim
Hi Andrew,
On 22/03/2020 16:05, Andrew C Aitchison wrote:
On Sun, 22 Mar 2020, Steve Freegard via mailop wrote:
I didn't design this to annoy people, I did it because it's useful
for the internet in general because compromised accounts are a huge
issue, and one that causes issues for
On Sun, 22 Mar 2020, Steve Freegard via mailop wrote:
This data is inherently noisy and I've gone to extreme lengths
to remove as much noise as possible and provide Abuse
Desks/Postmasters some visibility that they do not currently
have.
Whilst this time it's reported an alias, next time
Hi Atro,
On 22/03/2020 11:23, Atro Tossavainen via mailop wrote:
On Sun, Mar 22, 2020 at 02:11:45PM +1000, Ted Cooper via mailop wrote:
Has anyone run into "Abusix" /potentially/ compromised account
notification emails before?
Not before, but now that you say, yes.
I have a few dozen samples
Hi Thomas,
On 22/03/2020 09:03, Thomas Walter via mailop wrote:
I got the same email with some of our local accounts and aliases.
Interestingly enough it included the same IP address 185.234.219.89.
That will happen, one IP usually goes absolutely crazy and sends most of
the traffic, other
Hi Luis,
On 22/03/2020 04:59, Luis E. Muñoz via mailop wrote:
I got three in the last 48 hours at different sites. All referenced
real user accounts – no clue about the password. The warning seemed
legit so I passed the info to the potentially affected users, with the
recommendation to
Hello Ted,
On 22/03/2020 04:11, Ted Cooper via mailop wrote:
Has anyone run into "Abusix" /potentially/ compromised account
notification emails before?
Their website "abusix.ai" looks to be about a week old based on the age
of all of the articles. I would have guessed they'd have been around
On Sun, Mar 22, 2020 at 02:11:45PM +1000, Ted Cooper via mailop wrote:
> Has anyone run into "Abusix" /potentially/ compromised account
> notification emails before?
Not before, but now that you say, yes.
I have a few dozen samples in spamtraps from Friday Mar 20, never before.
They're both in
Hey everyone,
On 22.03.20 05:11, Ted Cooper via mailop wrote:
> Has anyone run into "Abusix" /potentially/ compromised account
> notification emails before?
I got the same email with some of our local accounts and aliases.
Interestingly enough it included the same IP address 185.234.219.89.
The solution is rather more complex but yes, what you describe might be a
useful start. Free accounts, hacked accounts, accounts bought using stolen
cards .. so many vectors. And then yet more vectors in just how you can abuse
a service that can be coaxed into sending out mail with some
Am 22.03.20 um 08:37 schrieb Suresh Ramasubramanian via mailop:
>
> This is abuse of free trial accounts of office 365, and the document sharing
> that sharepoint allows. Create a
> document with porn spam text and share it, with a porn spam spiel, with a big
> list of spam recipients.
>
>
>
16 matches
Mail list logo