Spinal
MB Enthusiast
- Joined
- Sep 14, 2004
- Messages
- 4,806
- Location
- between Uxbridge and the Alps
- Car
- x254, G350, Duster, S320, Mach1, 900ss and a few more
Yes and no... you're reducing the value of each email as there won't be a list of email addresses to be harvested. That said, if your contacts which you just emailed then forward your email to 10x people (without ammending the body to remove your address and so on), your email address will be included and thus be on a list somewhere.Yes I believe you are. I always send mine out with all recipients in the BCC line so even they are unaware of each other.
I'd be interested to hear from our more knowledgable colleagues here if I am avoiding the harvesters?
As above; that said - you need to get to a limit. Too much paranoia and you wont leave the house!So some of the very good jokes I send out (which come to me by email) from a couple of buddies. Am I risking my buddies and recipients internet/email safety by doing this.
Spoofing from addresses is almost as old as emails - it's spoofing addresses that are "trusted" from the recipients, and harvesting that level of detail that is very new. RBN are VERY organised and well funded, Viagra is just one of their exploits. We've seen (many) actual attacks on client infrastructure from who we believe is RBN. IN cases when they get in, they will tend to either steal data and offer not to spread it to the world for a fee; or encrypt data and offer to decrypt ti for a fee.I know, that's very recent, and a scammer I was 'baiting' accidentally sent me a scan of one such list (along with a host of his aliases in the cc line) and when I questioned him he said it was a mistake. It had groups with arrows etc. (handwritten!). So they can spoof addresses, I think you're right about that with the successful Russian Viagra spam (the businesses are ultimately owned by the Russian Business Network as they call themselves (Russian Mafia)), lower level 419 scammers just buy the email address lists. What you need to consider is how they would get hold of chain letters -who would forward one to a criminal?
Forwarding to a "criminal" is easier than you think. Put it this way; you forward your letter to 20 people, that's 21 people who have seen it and 21 email addresses. Those 20 each do the same, so now we are at 421 (400 new). That's 2 forwards. again and it's 8,000 new people. Then 160,000. Then about 8 million, 64 million, 1.2billion, 24 billion new addresses -oops we are out of people on the planet. (yes, people have multiple accounts and so on, but it's exponential so you get the idea). All within 10 forwards of your original email. At some point, someone willing to make a quick buck will take the email, strip out the email addresses and sell them (they usually go for about $5 for 1mb of email addresses, more for valid email addresses with a referrer). Obviously this can be scripted so you don't need to do anything.
Another source is sniffing - email is NOT a confidential protocol. Everythign is sent in clear-text. This means that if I set up a mail relay, I can read all the emails that flow through my box. Or if I sniff all traffic on a backbone (RBN and Chinese are the only two organisations with the infrastructure to do this at a global level, that I know of, at the moment) and pull out what I need. Generally, when speaking, to larger clients, their comeback is "oh, but it's all fragmented into packets. So the chance that all packets travel through the same place is very low". Which is true- but I don't NEED the whole email. I just need the email addresses, which I can grab from individual packets without recompiling your original email.
CC vs BCC - very right.BCC seems to mean the email is sent out as if individually to each person, CC means it's sent out to everyone as one email. I may be wrong. But I think that's getting a bit paranoid - I send out emails to groups of people and know as a fact I don't send spam out to my contacts (I have work and private email addresses I copy my emails to so I can forward them later if I want without having to search for the original email, and they never get spam sent to them).
I still want to know how a chain email would fall into the hands of a spammer...
Spammers also like hacking into mail servers and using them to send email. My website server ran Windows NT4 Server (yes, the 1996 edition) until recently and weekly I checked the logs and saw so many failed attempts to send spam. The "badmail" folder was full of copies of emails that couldn't be sent (only because I hadn't configured the SMTP add-on). They were all advertising viagra. Imagine if I HAD set the server up to send emails - it would have become a spambot out of my control. I now run Windows Server 2008 and the issue is just about gone. My point is your server (or computer!) can unknowingly be used to send spam.
Mail server could have been hacked, or, more likely, you had a server that allowed unauthenticated sending of emails. Most mail servers from that era wont request credentials to send emails - it was a trust-based infrastructure.
Email was never designed to be "secure". Authentication, authorization and encryption are all "add ons"
M.
(and if you want to hire me, drop me a pm - I do security consultancy. Used to work for the worlds largest Security firm, and we did an MBO of their consulting team
