Internet Security

We found a massive spam operation — and sunk its server

For ten days in March, millions were caught in the same massive spam campaign. Each email looked like it came from someone the recipient knew: the spammer took stolen email addresses and passwords, quietly logged into their email account, scraped their recently sent emails and pushed out personalized emails to the recipient of that sent…


For ten daysin March, millions were caught in the same massive spam campaign.

Each email looked like it came from someone the recipient knew: the spammer took stolen email addresses and passwords, quietly logged into their email account, scraped their recently sent emails and pushed out personalized emails to the recipient of that sent email with a link to a fake site pushing a weight loss pill or a bitcoin scam.

The emails were so convincing more than 100,000 people clicked through.

We know this because a security researcher found the server leaking the entire operation. The spammer had forgotten to set a password.

Security researcher Bob Diachenko found the leaking data and with help from TechCrunch analyzed the server. At the time of the discovery, the spammer’s rig was no longer running. It had done its job, and the spammer had likely moved onto another server — likely in an effort to avoid getting blacklisted by anti-spam providers. But the server was primed to start spamming again.

Given there were more than three million unique exposed credentials sitting on this spammer’s server — hosted onintelimost.com, we wanted to secure the data as soon as possible. With no contact information for the spammer — surprise, surprise — we asked the hosting provider, Awknet, to pull the server offline. Within a few hours of making contact, the provider nullrouted the server, forcing all its network traffic into a sinkhole.

TechCrunch provided a copy of the database to Troy Hunt. Anyone can now check breach notification site Have I Been Pwned to see if their email was misused.

But the dormant server — while it was still active — offered a rare opportunity to understand how a spam operation works.

The one thing we didn’t have was the spam email itself. We reached out to dozens of people to ask about the email they received. Two replied — but only one still had a copy of the email.

The email sent by the spammer. (Image: supplied)

“The same mail appeared on three occasions,” said one of the recipients in an email to TechCrunch. “The subject was related to an email I had sent previously

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Internet Security

The new scam that could target anyone scrolling social media

Cybersecurity experts are warning Australia’s impending social media ban could lead to a rise in a new type of scam — with devastating consequences…

Cybersecurity experts are warning Australia’s impending social media ban could lead to a rise in a new type of scam — with devastating consequences…
Read More

Continue Reading
Internet Security

Chinese Ministry of National Security Warns of Risks Associated With Biometric Recognition Technology

The Chinese Ministry of National Security has issued a warning regarding the potential risks associated with biometric recognition technology, highlighting concerns over data security and privacy. The ministry emphasized that while biometric systems, such as facial recognition, iris scanning, and fingerprint scanning, offer convenience in daily life…

The Chinese Ministry of National Security has issued a warning regarding the potential risks associated with biometric recognition technology, highlighting concerns over data security and privacy. The ministry emphasized that while biometric systems, such as facial recognition, iris scanning, and fingerprint scanning, offer convenience in daily life…
Read More

Continue Reading
Internet Security

Kristi Noem’s DHS adds blasphemy to its list of offenses

Twice in the past month, the Department of Homeland Security has posted Bible-themed propaganda on its social media accounts to defend its deportation agenda…

Twice in the past month, the Department of Homeland Security has posted Bible-themed propaganda on its social media accounts to defend its deportation agenda…
Read More

Continue Reading
Internet Security

Home Office to crack down on promoting small boat crossings online

Anyone who advertises small boat Channel crossings or fake passports on social media could face up to five years in prison under new plans. Ministers are seeking to create a new offence under the Border Security, Asylum and Immigration Bill already going through Parliament, to widen its scope to tackle illegal entry to the UK…

Anyone who advertises small boat Channel crossings or fake passports on social media could face up to five years in prison under new plans. Ministers are seeking to create a new offence under the Border Security, Asylum and Immigration Bill already going through Parliament, to widen its scope to tackle illegal entry to the UK…
Read More

Continue Reading