lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040228202328.GTGL181170.fep02-mail.bloor.is.net.cable.rogers.com@BillDell> From: full-disclosure at royds.net (Bill Royds) Subject: Empty emails example I am still getting a lot of empty emails and noticed a peculiar similarity. All of them use a compromised or open relay home hispeed network connection to bounce the message. Here are the headers from one I just received ( others are similar but with different relay points). > Return-Path: <ZVIFHFGZRZI@...oo.com> > Received: from h0010b59bf977.ne.client2.attbi.com ([24.147.39.6]) > by fep02-mail.bloor.is.net.cable.rogers.com > (InterMail vM.5.01.05.12 201-253-122-126-112-20020820) with SMTP > id <20040228195530.WTUH244767.fep02-mail.bloor.is.net.cable.rogers.com@...10b59 bf977.ne.client2.attbi.com>; > Sat, 28 Feb 2004 14:55:30 -0500 > Received: from 80.76.205.232 by 24.147.39.6; Sun, 29 Feb 2004 00:46:57 +0500 > Message-ID: <Y[20 > Date: Sat, 28 Feb 2004 14:55:31 -0500 > The return path is an obvious fake The immediate relay point is a cable modem customer The seeming original sender is a British company with domain tradeelectronically.com which is a hosting service. Are others seeing this pattern?
Powered by blists - more mailing lists