Message Board

Newbie/Basic Questions

Older Posts ]   [ Newer Posts ]
 WHOIS Self Spamming
Author: A.Brager   (1 Apr 07 11:50am)
Has anyone else noticed the recent trend toward spammers harvesting WHOIS data and using it to send what I call "best guess" self-SPAM?

They grab a domain name from the WHOIS database, and then take their best guess at valid email addresses. They try things like "sales@domain.com", "support@domain.com", and other commonly used addresses. Worse, they forge the address so it looks like it's coming from your own domain! So a message TO sales@domain.com is also FROM sales@domain.com.

Although my webhost provides me with the ability to designate particular email addresses and setup special POP boxes for those email addresses, anything to my domain which is not recognized, gets aliased to my primary address. I actually like that, because sometimes valid email is mis-addressed, and I also really don't want to setup a seperate box - which I then have to go and check individually - for each address I use.

Although project honeypot is a fabulous idea, I don't think it can protect against this type of spammery. Has any thought been given to this at all in terms of how to protect oneself? What about for those of us on DSL lines using dynamic IP's to get to our web hosts?

Thank you
 
 Re: WHOIS Self Spamming
Author: M.Prince   (3 Apr 07 8:35pm)
Project Honey Pot tracks this as "Dictionary Attacks." Basically they're using common usernames and appending them to domains/MXs that they find. Since we have such a large number of domains pointing at our mail servers, we see a lot of it. If you want to see the top IPs sending out these attacks, check out:

http://www.projecthoneypot.org/top_dictionary_attackers.php

Matthew.



do not follow this link

Privacy Policy | Terms of Use | About Project Honey Pot | FAQ | Cloudflare Site Protection | Contact Us

Copyright © 2004–25, Unspam Technologies, Inc. All rights reserved.

contact | wiki | email