Recommended Posts

At my business, we use hosted Exchange by Rackspace. I've been sending out bulk emails for marketing by emailing to myself and then BCC'ing my contacts.

 

A couple of my customers said that they've been getting scam emails that look like they are from my email address. My email address somehow shows in the from field but when they try and reply, it is some other email address. There is usually a DOC attachment that is infected with a virus.

 

Do I have any way to stop this from happening short of changing my email address?

 

Also, one of my customers alluded to the fact that sending bulk emails using BCC like that actually allows scammers to do this. IS that somehow true?

Link to comment
https://www.neowin.net/forum/topic/1378303-someone-is-using-my-email-address/
Share on other sites

  On 04/01/2019 at 17:56, patseguin said:

Also, one of my customers alluded to the fact that sending bulk emails using BCC like that actually allows scammers to do this. IS that somehow true?

Expand  

Once the scammers harvested your email address, they were able to send out their own emails, and make it appear you were sending the emails out.  By providing a list of email addresses within the BCC field, you made their job easier, when it came to finding potential victims.  The reason the list was compromised, is due to the fact somebody who received your email, was likely compromised themselves. 

 

You really shouldn't expose who else is receiving your email anyways.

  On 04/01/2019 at 18:10, TheGhostPhantom said:

Once the scammers harvested your email address, they were able to send out their own emails, and make it appear you were sending the emails out.  By providing a list of email addresses within the BCC field, you made their job easier, when it came to finding potential victims.  The reason the list was compromised, is due to the fact somebody who received your email, was likely compromised themselves.

Expand  

How exactly would one harvest an email from BCC? There's a reason why it's called blind carbon copy. CC I get, BCC, no.

 

  Quote

You really shouldn't expose who else is receiving your email anyways.

Expand  

 

um, we call that bcc.

 

--

 

Chances are:

a) your system is infected with malware that captured your address book and is spoofing your email, or directly sending sketchy email from your client as you.

b) someone else system in your corp is infected with malware and copied their address books/email receipts and is spoofing your e-mail address, in which case I'd assume all sorts of other people in your company are also having their addresses spoofed

c) a client is infected and their address book that happen to have your email along with other clients email addresses was harvested by malware and is now spoofing emails with your address.

 

Sounds like option a or b is most likely, unless your clients are communicating with each other.

Edited by shockz
  On 04/01/2019 at 18:10, TheGhostPhantom said:

Once the scammers harvested your email address, they were able to send out their own emails, and make it appear you were sending the emails out.  By providing a list of email addresses within the BCC field, you made their job easier, when it came to finding potential victims.  The reason the list was compromised, is due to the fact somebody who received your email, was likely compromised themselves. 

 

You really shouldn't expose who else is receiving your email anyways.

Expand  

The entire purpose of BCC is to mask the email addresses of everyone for each person getting the email. If someone getting the email was compromised the only email address they would see, would be the email address on the to line. Not the entire list.

 

Could your email account have been compromised? Could they have gotten access to your contact list? Do you have two-factor authentication turned on?

You cannot stop someone from spoofing your mail domain.  you can request that the recipient that is getting messages from a spoofed domain to utilize DMARC and SPF to help stop the spammers from spoofing mail addresses.  

 

For your education:

SPF : https://en.wikipedia.org/wiki/Sender_Policy_Framework

DMARC: https://dmarc.org/

 

Can you stop a stranger from using a random number as a ss number from utilizing your name?  No, you can't.

 

They can ask for identification from that stranger so that they know who it is is the real person.  If they aren't configured to ask for ID, that isn't your problem.  If they allow anyone pretending to be anyone come in, also not your problem or anything you can do to fix it as you aren't the admin who can set that up.

  On 04/01/2019 at 18:29, shockz said:

How exactly would one harvest an email from BCC? There's a reason why it's called blind carbon copy. CC I get, BCC, no.

 

 

um, we call that bcc.

 

--

 

Chances are:

a) your system is infected with malware that captured your address book and is spoofing your email, or directly sending sketchy email from your client as you.

b) someone else system in your corp is infected with malware and copied their address books/email receipts and is spoofing your e-mail address, in which case I'd assume all sorts of other people in your company are also having their addresses spoofed

c) a client is infected and their address book that happen to have your email along with other clients email addresses was harvested by malware and is now spoofing emails with your address.

 

Sounds like option a or b is most likely, unless your clients are communicating with each other.

Expand  

Could be c maybe. Before any of this happened, I RECEIVED an email that looked like it was form one of my clients. It had the infected DOC file which I was smart enough to not even open. It happened 3-4 times before I let him know that he was getting spoofed. He is also in my BCC email list, so he must be infected and my email address was taken on his infected system. Does that sound about right? I ran Windows Defender on my workstation and it found nothing.

 

@sc302point taken. I did some research and there appears to be no way to stop someone from spoofing my email address.

Pat, for what it is worth, people in my organization get messages from the CEO of the company asking for target cards or other cards via email.  These emails aren't sourced from my domain nor are they from any domain we own.  My CEO has a unique name and a few of them took it as it was actually him and responded to "him".  There is nothing I can do from blocking you from setting up an email with his name and sending it to someone within my org.  Only a few people have been stupid enough to respond, but one tried to wire money to another country because of it (thankfully the bank caught it).  As an admin, there is little I can do about that and there could be another as there are a lot of John Smith's in the world.  The immediate give away is lack of signature.

 

email address is similar and can be spoofed easily.  I dont allow spoofing from my domain so that gets caught, but I cannot stop someone from spoofing your domain.  I can stop that someone from getting in utilizing SPF, DMARC, DKIM to verify and authenticate that information....a down side to that is that this is voluntary the hosting domain has to have this setup on their public dns.  But being that you utilize rackspace they probably have those records already set up for you and it is up to your customer to utilize that, it get setup up on your dns servers.  If you control the public dns servers for your site, you can verify it, or set it up if you haven't.

 

you can't stop it any more than you can stop me from saying I am patseguin or changing my signature to say so (though you have gmod rights so you could change it back to say whatever you want, but that isn't usually the case).  

SPF, DKIM, DMARC are your friends.

 

Not every recipient system honors these frameworks, but most (good ones) do.  The nutshell I'm getting at here is that you cannot prevent someone from spoofing your address, but you can definitely inform the recipient systems which emails from you are valid.  Most recipient systems honor SPF, when set up correctly, and DKIM and DMARC are there to cover potential loopholes.  Any system with all three fully enforced will have virtually no problems.

 

Verify your domain has them set up.  I recommend dmarcian https://dmarcian.com/domain-checker/

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • Weekend PC Game Deals: Automation fests, Civilization for free, charity specials, and more by Pulasthi Ariyasinghe Weekend PC Game Deals is where the hottest gaming deals from all over the internet are gathered into one place every week for your consumption. So kick back, relax, and hold on to your wallets. The Epic Games Store unlocked a big strategy game giveaway earlier this week: Civilization VI: Platinum Edition. Coming in from Firaxis Games, the turn-based 4X experience has you starting world-conquering campaigns to explore, expand, exploit, and exterminate everything in your empire's reach. PvP and co-op multiplayer are also options if the various forms of AI prove to be too easy or even too troublesome. The Sid Meier’s Civilization VI: Platinum Edition giveaway is live until July 24, and it comes with two massive expansions as well as six DLC packs with extra scenarios, leaders, and more. Next week, tower defense title Legion TD 2 will become the latest freebie on the Epic Games Store. The Humble Store brought a new bundle for action game fans this weekend, and it's all about the Devil May Cry franchise. The Devil Trigger Collection begins with DmC: Devil May Cry and Devil May Cry HD Collection for $10. If you want to complete the bundle, it will set you back $20, which gets you Devil May Cry 4 Special Edition as well as the most recent entry, Devil May Cry 5, as well as its Vergil DLC. This bundle has two weeks left on its counter before it goes away. Big Deals Most publishers are returning to their usual weekend specials after the massive summer sales, so there are plenty of discounts to go around. There's even a special Make a Wish charity sale running on Steam with some discounted viral hits. With all those and more, here's our hand-picked big deals list for the weekend: Satisfactory – $27.99 on Steam Captain of Industry – $24.49 on Steam No Man's Sky – $23.99 on Steam Persona 5 Royal – $23.99 on Steam No More Room in Hell 2 – $22.49 on Steam FOUNDRY – $20.99 on Steam Banishers: Ghosts of New Eden – $19.99 on Steam SULFUR – $19.99 on Steam Assassin's Creed Mirage – $19.99 on Steam Alan Wake 2 – $19.99 on Epic Store Grand Theft Auto V Enhanced – $19.79 on Steam Norland – $19.49 on Steam Stray – $17.99 on Steam V Rising – $17.49 on Steam Dyson Sphere Program – $15.99 on Steam The Outlast Trials – $15.99 on Steam Warhammer 40,000: Darktide – $15.99 on Steam The Outlast Trials – $15.99 on Steam Red Dead Redemption 2 – $14.99 on Steam Turing Complete – $13.99 on Steam Eden Crafters – $13.99 on Steam Core Keeper – $13.99 on Steam Thank Goodness You're Here! – $12.99 on Steam Opus Magnum – $9.99 on Steam Autonauts – $9.99 on Steam EXAPUNKS – $9.99 on Steam DRAGON BALL XENOVERSE 2 – $9.99 on Steam Superliminal – $9.99 on Steam Heaven's Vault – $9.99 on Steam RAILGRADE – $9.89 on Steam Goat Simulator 3 – $9.89 on Steam Tchia – $9.89 on Steam ACE COMBAT 7: SKIES UNKNOWN – $9.59 on Steam PAYDAY 3 – $8.99 on Steam Assassin's Creed Origins – $8.99 on Steam Viewfinder – $8.74 on Steam Escape Academy – $7.99 on Steam Pit People – $7.99 on Steam Skull and Bones – $7.99 on Steam Immortals Fenyx Rising – $7.99 on Steam Imperator: Rome – $7.59 on Steam SHENZHEN I/O – $7.49 on Steam Tom Clancy’s The Division 2 – $7.49 on Steam Bassmaster Fishing – $7.49 on Steam Let's Build a Zoo – $6.99 on Steam The Forgotten City – $6.24 on Steam Control Ultimate Edition – $5.99 on Steam Bramble: The Mountain King – $5.99 on Steam Assassin’s Creed Rogue – $5.99 on Steam RoboCop: Rogue City – $4.99 on Steam Kingdom Two Crowns – $4.99 on Steam Scott Pilgrim vs. The World: The Game – $4.94 on Steam Castle Crashers – $4.49 on Steam BattleBlock Theater – $4.49 on Steam TOEM: A Photo Adventure – $3.99 on Steam Supraland – $3.99 on Steam Vampire Survivors – $3.99 on Steam Darkwood – $3.74 on Steam Valiant Hearts: The Great War – $3.74 on Steam TIS-100 – $3.49 on Steam PAYDAY 2 – $3.29 on Steam Cake Bash – $2.99 on Steam Ragnarock – $1.99 on Steam Alan Wake – $1.49 on Steam Civilization VI Platinum Edition – $0 on Epic Store DRM-free Specials Lastly, here are some highlights from the DRM-free discounts available on the GOG store this weekend: Age of Wonders 4 - $29.99 on GOG Pathfinder: Wrath of the Righteous - Game of the Year Edition - $19.99 on GOG Tomb Raider IV-VI Remastered - $19.49 on GOG The Thaumaturge - $19.24 on GOG Chained Echoes - $13.74 on GOG Tyranny - Gold Edition - $12.49 on GOG Tomb Raider I-III Remastered Starring Lara Croft - $11.99 on GOG Baldur's Gate: Enhanced Edition - $9.99 on GOG Baldur's Gate II: Enhanced Edition - $9.99 on GOG Neverwinter Nights: Enhanced Edition - $9.99 on GOG Old World - $9.99 on GOG Icewind Dale: Enhanced Edition - $9.99 on GOG Neverwinter Nights: Doom of Icewind Dale - $7.99 on GOG Kingdom Come: Deliverance - $5.99 on GOG Might and Magic 6-pack Limited Edition - $4.99 on GOG Heroes of Might and Magic 3: Complete - $4.99 on GOG Blood Omen: Legacy of Kain - $3.49 on GOG Might and Magic 8: Day of the Destroyer™ - $2.99 on GOG Worms Armageddon - $2.99 on GOG ATOM RPG: Post-apocalyptic indie game - $2.99 on GOG Keep in mind that availability and pricing for some deals could vary depending on the region. That's it for our pick of this weekend's PC game deals, and hopefully, some of you have enough self-restraint not to keep adding to your ever-growing backlogs. As always, there are an enormous number of other deals ready and waiting all over the interwebs, as well as on services you may already subscribe to if you comb through them, so keep your eyes open for those, and have a great weekend.
    • Wild that this was even allowed from the jump
    • Microsoft stops using China-based engineers to support US defense clients by Hamid Ganji Microsoft announced on Friday that its China-based engineers can no longer provide technical support to the US military and other defence clients using the company's cloud services. Frank Shaw, Microsoft's Chief Communications Officer, wrote on X, "In response to concerns raised earlier this week about US-supervised foreign engineers, Microsoft has made changes to our support for US Government customers to assure that no China-based engineering teams are providing technical assistance for DoD Government cloud and related services." The issue came into the spotlight after a report by ProPublica detailed how Microsoft's Azure engineers in China are providing technical support to the US defense clients. Microsoft had apparently told ProPublica that its engineers and contractors complied with US government laws. These China-based engineers are reportedly supervised through so-called "digital escorts" in the US, who are allegedly less technically qualified than the engineers and can not determine whether the Chinese engineers under their supervision pose a cyber threat to the United States. On Friday, Senator Tom Cotton sent a letter to Defense Secretary Pete Hegseth, demanding explanations about how these "digital escorts" are trained to detect threats, as well as the list of contractors that use Chinese personnel. "The US government recognizes that China's cyber capabilities pose one of the most aggressive and dangerous threats to the United States, as evidenced by infiltration of our critical infrastructure, telecommunications networks, and supply chains," Cotton wrote. In a video posted on X, Hegseth said this is "obviously unacceptable" and that he's issuing a two-week review of Pentagon cloud deals to ensure that "China will no longer have any involvement whatsoever in our cloud services, effective immediately." The US Defense Secretary also said the current controversy is due to "A legacy system created over a decade ago, during the Obama administration." Microsoft, Amazon, Google, and Oracle jointly received a $9 billion Department of Defense cloud services contract in 2022.
    • This morning down to 17% after 8 days.
    • Cutcon 4.0 by Razvan Serea Cutcon is a free, open-source desktop app for cutting, converting, and previewing video, audio, and image files. Built with Kotlin and powered by FFmpeg, it's fast, lightweight, and easy to use. Ideal for content creators, editors, and developers, Cutcon supports a wide range of media formats and offers a clean user interface. Originally forked from the Clipper project, it enhances performance and usability while remaining fully cross-platform. Whether trimming videos or converting audio formats, Cutcon streamlines your workflow without compromising quality. Perfect for those seeking a simple yet powerful media processing tool. Cutcon offers three core functions that make working with media files fast and simple: Cut – Remove unwanted sections from video, audio, or image files without re-encoding. Keep only what you need. Convert – Change files from one format to another using FFmpeg. Supports a wide range of formats for video, audio, and images. Preview – Play media directly inside the app before cutting or converting. Quickly verify content without opening another program. Cutcon 4 release notes: This release rebases Cutcon on Clipper v1.20.0 bringing support for Linux and macOS and updating the app branding. Also, there is now only one variant of the app with support for most common media types. New features Add support for Linux operating system (common distros) Add support for macOS operating system (experimental) Add support for playing FLAC audio format Add support for playing Opus audio format Improvements Update app brand (logo, colors) Improve media player to hugely boost its performance Use a fake file for the app initial input source Make theme colors change with animation Update the app error window layout Misc Change log file directory to user home Several improvements in app code Download: Cutcon 4.0 | 89.8 MB (Open Source) View: Cutcon Website | Screenshot Get alerted to all of our Software updates on Twitter at @NeowinSoftware
  • Recent Achievements

    • Dedicated
      Homeless Vagrant earned a badge
      Dedicated
    • One Month Later
      Coolray5432 earned a badge
      One Month Later
    • Week One Done
      Coolray5432 earned a badge
      Week One Done
    • One Year In
      Jonabomuk earned a badge
      One Year In
    • One Month Later
      Jonabomuk earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      498
    2. 2
      ATLien_0
      223
    3. 3
      Michael Scrip
      196
    4. 4
      Xenon
      161
    5. 5
      +FloatingFatMan
      138
  • Tell a friend

    Love Neowin? Tell a friend!