{"id":9033,"date":"2017-08-30T11:10:56","date_gmt":"2017-08-30T15:10:56","guid":{"rendered":"http:\/\/worldjusticenews.com\/news\/?p=9033"},"modified":"2017-08-30T11:27:41","modified_gmt":"2017-08-30T15:27:41","slug":"giant-spambot-scooped-711-million-email-addresses","status":"publish","type":"post","link":"https:\/\/worldjusticenews.com\/news\/2017\/08\/30\/giant-spambot-scooped-711-million-email-addresses\/","title":{"rendered":"Giant spambot scooped up 711 million email addresses"},"content":{"rendered":"<p class=\"story-body__introduction\">A malware researcher has discovered a spamming operation that has been drawing on a list of 711.5 million email addresses.<\/p>\n<p>The scale of the scheme appears to make it the biggest find of its kind.<\/p>\n<p>The addresses &#8211; and in some cases associated passwords &#8211; have apparently been gathered to help spread banking malware.<\/p>\n<p>Members of the public can check if their accounts have been affected via\u00a0<a class=\"story-body__link-external\" href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">the Have I Been Pwned service<\/a>.<\/p>\n<p>Its operator, Troy Hunt, acknowledged that some of the listed addresses corresponded to non-existent accounts.<\/p>\n<p>But he\u00a0<a class=\"story-body__link-external\" href=\"https:\/\/www.troyhunt.com\/inside-the-massive-711-million-record-onliner-spambot-dump\/\" target=\"_blank\" rel=\"noopener\">added that the number<\/a>\u00a0that had been collated still totalled a &#8220;mind-boggling amount&#8221;.<\/p>\n<p>The Spambot discovery was\u00a0<a class=\"story-body__link-external\" href=\"https:\/\/benkowlab.blogspot.co.uk\/2017\/08\/from-onliner-spambot-to-millions-of.html\" target=\"_blank\" rel=\"noopener\">first flagged by a Paris-based<\/a>\u00a0security expert who calls himself Benkow.<\/p>\n<p>It was then brought to wider attention by the\u00a0<a class=\"story-body__link-external\" href=\"http:\/\/www.zdnet.com\/article\/onliner-spambot-largest-ever-malware-campaign-millions\/\" target=\"_blank\" rel=\"noopener\">ZDnet news site<\/a>.<\/p>\n<figure style=\"width: 624px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ichef.bbci.co.uk\/news\/624\/cpsprodpb\/168FA\/production\/_97601429_c2c5a4c9-ef31-4d3f-8a6d-a776b029a45d.jpg\" alt=\"Spam\" width=\"624\" height=\"255\" \/><figcaption class=\"wp-caption-text\"><em>Benkow said this email was one example of the type of spam that had been used<\/em><\/figcaption><\/figure>\n<p>The database of 711 million user details can be divided in two.<\/p>\n<p>In cases where the attackers know only an email address, they can only target the owner with spam in the hope of tricking them into revealing more information.<\/p>\n<p>But in cases where they also have the user&#8217;s login password and other details, they can secretly hijack their accounts to aid their campaign via a spambot known as Onliner.<\/p>\n<p>Benkow acknowledged that it was &#8220;difficult to know where [the] credentials had come from&#8221;, but suggested that they might have been gathered from previous leaks, a Facebook phishing campaign and illegal sales of hacking victims&#8217; details.<\/p>\n<p>In some cases, the perpetrators had gathered details of the accounts&#8217; simple mail transfer protocol (SMTP) server and port settings.<\/p>\n<p>This information could be used to fool email providers&#8217; spam-detecting systems into letting messages through that might otherwise have been blocked.<\/p>\n<p>&#8220;While the list of mailable addresses is quite large, it is probably no larger than any seen previously,&#8221; Richard Cox, former chief information officer of the Spamhaus project, told the BBC.<\/p>\n<p>&#8220;The lists of compromised accounts are more worrying.<\/p>\n<p>&#8220;When compromised accounts are used for spam, they can only be stopped by their providers suspending the account &#8211; but when that many are involved, it will severely overload the security\/abuse departments of those providers, making it a slow process and that is what keeps the spam flowing.&#8221;<\/p>\n<p>Benkow added that the Onliner spambot had been hiding tiny pixel-sized images in the emails it had sent out, which were used to harvest information about recipients&#8217; computers.<\/p>\n<p>This meant that the right kinds of malware attachments required to infect different types of devices could be included when follow-up messages masquerading as business invoices were delivered.<\/p>\n<p>Mr Hunt said that the Spambot lists had been tracked to a Netherlands-based computer server, but it had yet to be shut down.<\/p>\n<p>For now, affected users are able to check only if their email addresses have been targeted, but not if their accounts have been hijacked.<\/p>\n<p>But Benkow told the BBC there were still protective steps affected users could take.<\/p>\n<p>&#8220;I recommend you to change your password, and be more vigilant with the emails that you receive, now you know that you&#8217;re on malware deliverers&#8217; lists,&#8221; he said.<\/p>\n<p>Source: <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-41095606\" target=\"_blank\" rel=\"noopener\">bbc.co.uk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\">A malware researcher has discovered a spamming operation that has been drawing on a list of 711.5 million email addresses. The scale of the scheme appears to make it the biggest find of its kind. <a class=\"mh-excerpt-more\" href=\"https:\/\/worldjusticenews.com\/news\/2017\/08\/30\/giant-spambot-scooped-711-million-email-addresses\/\" title=\"Giant spambot scooped up 711 million email addresses\">[&#8230;]<\/a><\/div>\n","protected":false},"author":1,"featured_media":9037,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","footnotes":""},"categories":[109,2,6],"tags":[4110,4111,4107,4109,4108],"class_list":{"0":"post-9033","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-headline","8":"category-news","9":"category-world","10":"tag-benkow","11":"tag-spam","12":"tag-spambot","13":"tag-spamhaus","14":"tag-zdnet","15":"pmpro-has-access"},"_links":{"self":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/9033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/comments?post=9033"}],"version-history":[{"count":1,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/9033\/revisions"}],"predecessor-version":[{"id":9035,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/9033\/revisions\/9035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media\/9037"}],"wp:attachment":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media?parent=9033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/categories?post=9033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/tags?post=9033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}