lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <dg757a$fg9$1@sea.gmane.org>
Date: Tue Sep 13 19:25:45 2005
From: davek_throwaway at hotmail.com (Dave Korn)
Subject: Re: Re: Automated mass abuse of form mailers

----Original Message----
>From: Aditya Deshmukh
>Message-Id:
!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAA0BKn9uKnWEeCDU7Vx+IAQ8KAAAAQA
AAAObbFSKrQek2M9ZEfGt0ItwEAAAAA@...ine.gateway.strangled.net

>>> Another address they use is bergkoch8@....com
>>> (noticed aol abuse about this, but I guess that's /dev/null)
>>
>>   I'm going to start putting both those addresses into all
>> the unsubscribe
>> links I get in all my spam... >:->
>>
>
> This might be someones' 0wned email address.
>

  It _might_ be, but it's far more likely that they're using it as a dropbox
to test whether their spam is getting through and which scripts are
vulnerable, given the pattern of usage described by the OP.

    cheers,
      DaveK
-- 
Can't think of a witty .sigline today....



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ