I’ve seen a few hundred of these emails in the past couple days coming in from multiple different companies.
I’m looking for more info.
at least one said it was zendesk, most did not say any software.
the tickets are being sent with CC addresses that contain large email lists. often others on the CC who don’t know what’s happening will reply “stop emailing me”.
so far I’ve seen this coming in to multiple addresses and none of the sending companies are familiar either.
sounds familiar to anyone? any info on this? it’s there a name i can lookup to find more info? i want to know what services this effects so i can properly protect my stuff and my work stuff.
Reply-all with “unsubscribe”
Edit: Jesus, y’all are dense.
that’s not going to stop the hacked system from spamming myself and every other customer they have. I would highly doubt if they even take the time to look at any replies let alone actually read them and unsubscribe anyone who asked for it… after the entire hack was over because I called one company and they were already aware of the hack and were trying to stop it.
I’m getting big “haha i was just pretending” vibes from that guy who wrote you a paragraph lol
My comment was to others who didn’t see that you used that sarcastic font when you hit post.
I didn’t downvote. 🤷
Check out https://port87.com
It’s an email service that I developed to solve this kind of problem. Everything you sign up for has its own address, so if you get these to your bank address, you know it’s a scam.
If you’re happy with your current email provider, you can achieve a similar result with subaddressing (aka plus addressing), if you set up a filter for each new address.
Interesting service. I’ve been doing this manually with Addy.io but that’s not feasible or desired by most, this could be a solution for that.
Not yet, but I’m working on that. SMTP works from a mail client, but I haven’t finished the IMAP server. I’m also working on customer domains, so you can bring your own domain. It’ll work with a single user setup (label@mydomain.com) or multi user setup (user-label@mydomain.com).
If you’re happy with your current email provider, you can achieve a similar result with subaddressing (aka plus addressing), if you set up a filter for each new address.
Subadressing isn’t quite as trustworthy, though, since it’s trivial to strip the plus tag, or other marks from the email.
That is true. I think spam lists usually have many thousands of addresses though, so unless they’re doing it with a script, they’re probably not stripping the subaddresses.
But a service that lets you use a dash instead of a plus, like Port87, is a bit safer in that regard. The dash is also accepted everywhere, whereas some places (like Microsoft) don’t accept a plus in an email address.
Does the hyphen get accepted everywhere? I use aliases already for every sign up but a shocking number of websites reject emails with the + sign as invalid, often the ones I’m most concerned about.
Duck.com is a great service, but it doesn’t have the same features as Port87, and it has different goals and a different purpose as a service.
Duck.com is meant to keep your existing email address private. It forwards messages to your current email provider. You could use a duck.com address to keep a Port87 address private.
Port87 is meant to be your email provider. It doesn’t forward mail, but instead receives/sends mail for you. You get unlimited subaddresses with Port87, and each one has its own label in your account with its own settings, like whether to send push notifications, mark email as read, screen new senders, etc. It’s meant to help you stay organized by keeping your email categorized for you. It’s also available free. There are paid features, but you can receive mail to unlimited addresses for free.
The two services work very well together, and you can get the benefits of both!
Why do you think anything is hacked? It’s trivially easy to send an email pretending to be someone else. There’s no validation.
Do they contain valid data or something?
I’ve seen hundreds of those and they’re mostly phishing attempts. this new one doesn’t look anything like that.
this one has multiple addresses in the CC field, at least one of which is always a predefined list on the senders side. and it’s otherwise a legit looking support ticket response.
but i want to know what’s the origin, what’s the vectors, and what’s the target.
Optional, but recommended. But doesn’t guarantee anything unless both sides respect it. Also, IP spoofing is a thing.
Email is a broken protocol. There’s a great copy pasta about why it can’t or won’t be fixed, which I unfortunately can’t find. But it boils down to the fact that you can’t get everyone to agree on, or implement, the fixes necessary to prevent spam.
Where seeing it as well. I’m unsure what the scam is. The ticket systems we saw don’t have any obvious connection to our industry. It is a lot of noise, but it wasn’t like a coverup spam, because it hit multiple users in the org at once. Really a strange thing.
i assume something just got popular with script kiddies, but i want to know what it is and what systems it effects so i can know if I’m protected or not.
gonna keep looking at least as long as i keep seeing this happening
Do yours have an onmicrosoft.com account CC’d? Both cases we have seen have had a different onmicrosoft.com account CC’d.
not sure if all of them did, but some did for sure. off looking address too
You’d be surprised how many of those emails I am still somehow getting… Not at all surprised.