On 01/08/2019 01:25 PM, John Rollins via cctalk
wrote:
That they found an address used only for a
certain mailing list makes
it more interesting. Doing a quick Google search it looks like the
list archives can be searched through, and while the addresses appear
to be slightly obfuscated using ?at? instead of ?@?, it?s feasible
that the address was picked up by a random email address scraping of
web data.
I've wondered if some unscrupulous person has subscribed to the list
so that they can receive a steady stream of email addresses that they
can potentially send spam / phishing emails to.
I don't remember ever getting one of these types of messages.? So I
can't comment about them with anything other than 2nd (or more) hand
knowledge.? Though I run fairly tight anti-spam / anti-virus
configuration on my server.
I would actually be interested in seeing full messages source,
including headers, for some of the messages.? (If anyone is willing
and interested in sharing.)
I to have received that phishing attempt many times.
Its actually funny.? The password given is three yahoo (groups) hacks
ago (about 10 years) but the email address
used was a public one way reflector (arrl.net).? So all and all its a
crude phishing attempt.? I write down old
passwords to keep from reuse and I use long mixed ones.? So I know it
was from that and meaningless.
The source is useless as the address is a bogus hack as well.
Same claims of rude and crude caught off the camera save for the systems
use never had one or are
blocked/disconnected(laptops) and at best a stupid threat. I run linux
on multiple flavors/platforms so
typical M$ hacks don't fly either.
I was tempted to buy the smallest bitcoin possible maybe 0.1 cent (1
milliDollar) for laughs
and send that as they deserve the very least for a dumb hack.
Ignore the phoolz and if the password matches current change it consider
changing
them periodically.
A=