{"id":1291,"date":"2017-08-30T16:44:26","date_gmt":"2017-08-30T15:44:26","guid":{"rendered":"http:\/\/kevinbillington.com\/site\/?p=1291"},"modified":"2017-09-18T13:53:21","modified_gmt":"2017-09-18T12:53:21","slug":"giant-spambot-scooped-up-711-million-email-addresses","status":"publish","type":"post","link":"https:\/\/kevinbillington.com\/site\/?p=1291","title":{"rendered":"Giant spambot scooped up 711 million email addresses"},"content":{"rendered":"<div>\n<div class=\"story-body__inner\">\n<p><span class=\"media-caption__text\">Leo Kelion,\u00a0<a href=\"http:\/\/www.bbc.co.uk\/news\/technology-41095606\" target=\"_blank\" rel=\"noopener\">http:\/\/www.bbc.co.uk\/news\/technology-41095606<\/a> on 30th August 2017<\/span><\/p>\n<p><span class=\"media-caption__text\"><br \/>\nMillions of computer users will be unaware that their email accounts have been targeted or even hijacked<br \/>\n<\/span><\/p>\n<p class=\"story-body__introduction\">A malware researcher has discovered a spamming operation that has been drawing on a list of 711.5 million email addresses.<\/p>\n<p>The scale of the scheme appears to make it the biggest find of its kind.<\/p>\n<p>The addresses &#8211; and in some cases associated passwords &#8211; have apparently been gathered to help spread banking malware.<\/p>\n<p>Members of the public can check if their accounts have been affected via <a class=\"story-body__link-external\" href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">the Have I Been Pwned service<\/a>.<\/p>\n<p>Its operator, Troy Hunt, acknowledged that some of the listed addresses corresponded to non-existent accounts.<\/p>\n<p>But he <a class=\"story-body__link-external\" href=\"https:\/\/www.troyhunt.com\/inside-the-massive-711-million-record-onliner-spambot-dump\/\">added that the number<\/a> that had been collated still totalled a &#8220;mind-boggling amount&#8221;.<\/p>\n<h2 class=\"story-body__crosshead\">Hidden images<\/h2>\n<p>The Spambot discovery was <a class=\"story-body__link-external\" href=\"https:\/\/benkowlab.blogspot.co.uk\/2017\/08\/from-onliner-spambot-to-millions-of.html\">first flagged by a Paris-based<\/a> security expert who calls himself Benkow.<\/p>\n<p>It was then brought to wider attention by the <a class=\"story-body__link-external\" href=\"http:\/\/www.zdnet.com\/article\/onliner-spambot-largest-ever-malware-campaign-millions\/\">ZDnet news site<\/a>.<\/p>\n<p><span class=\"image-and-copyright-container\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"responsive-image__img js-image-replace\" src=\"https:\/\/i0.wp.com\/ichef-1.bbci.co.uk\/news\/624\/cpsprodpb\/168FA\/production\/_97601429_c2c5a4c9-ef31-4d3f-8a6d-a776b029a45d.jpg?resize=731%2C300&#038;ssl=1\" alt=\"Spam\" width=\"731\" height=\"300\" data-highest-encountered-width=\"624\" \/><\/span><br \/>\n<span class=\"media-caption__text\"><br \/>\nBenkow said this email was one example of the type of spam that had been used<br \/>\n<\/span><\/p>\n<p>The database of 711 million user details can be divided in two.<\/p>\n<p>In cases where the attackers know only an email address, they can only target the owner with spam in the hope of tricking them into revealing more information.<\/p>\n<p>But in cases where they also have the user&#8217;s login password and other details, they can secretly hijack their accounts to aid their campaign via a spambot known as Onliner.<\/p>\n<p>Benkow acknowledged that it was &#8220;difficult to know where [the] credentials had come from&#8221;, but suggested that they might have been gathered from previous leaks, a Facebook phishing campaign and illegal sales of hacking victims&#8217; details.<\/p>\n<p>In some cases, the perpetrators had gathered details of the accounts&#8217; simple mail transfer protocol (SMTP) server and port settings.<\/p>\n<p>This information could be used to fool email providers&#8217; spam-detecting systems into letting messages through that might otherwise have been blocked.<\/p>\n<p>&#8220;While the list of mailable addresses is quite large, it is probably no larger than any seen previously,&#8221; Richard Cox, former chief information officer of the Spamhaus project, told the BBC.<\/p>\n<p>&#8220;The lists of compromised accounts are more worrying.<\/p>\n<p>&#8220;When compromised accounts are used for spam, they can only be stopped by their providers suspending the account &#8211; but when that many are involved, it will severely overload the security\/abuse departments of those providers, making it a slow process and that is what keeps the spam flowing.&#8221;<\/p>\n<p><span class=\"image-and-copyright-container\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"responsive-image__img js-image-replace\" src=\"https:\/\/i0.wp.com\/ichef-1.bbci.co.uk\/news\/624\/cpsprodpb\/D0A2\/production\/_97601435_180d4b26-08d8-4a5c-96f8-35882d738eb1.jpg?resize=731%2C411&#038;ssl=1\" alt=\"Spam attack\" width=\"731\" height=\"411\" data-highest-encountered-width=\"624\" \/><\/span><\/p>\n<p><span class=\"media-caption__text\"><br \/>\nThe spamming campaign seems to have been designed to steal banking details<br \/>\n<\/span><\/p>\n<p>Benkow added that the Onliner spambot had been hiding tiny pixel-sized images in the emails it had sent out, which were used to harvest information about recipients&#8217; computers.<\/p>\n<p>This meant that the right kinds of malware attachments required to infect different types of devices could be included when follow-up messages masquerading as business invoices were delivered.<\/p>\n<p>Mr Hunt said that the Spambot lists had been tracked to a Netherlands-based computer server, but it had yet to be shut down.<\/p>\n<p>For now, affected users are able to check only if their email addresses have been targeted, but not if their accounts have been hijacked.<\/p>\n<p>But Benkow told the BBC there were still protective steps affected users could take.<\/p>\n<p>&#8220;I recommend you to change your password, and be more vigilant with the emails that you receive, now you know that you&#8217;re on malware deliverers&#8217; lists,&#8221; he said.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Leo Kelion,\u00a0http:\/\/www.bbc.co.uk\/news\/technology-41095606 on 30th August 2017 Millions of computer users will be unaware that their &hellip;<\/p>\n","protected":false},"author":1,"featured_media":1293,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[90],"tags":[171,135,169,170],"class_list":["post-1291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-email","tag-hack","tag-spam","tag-theft"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/kevinbillington.com\/site\/wp-content\/uploads\/2017\/08\/711M.jpg?fit=660%2C371&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p45vMv-kP","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=\/wp\/v2\/posts\/1291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1291"}],"version-history":[{"count":3,"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=\/wp\/v2\/posts\/1291\/revisions"}],"predecessor-version":[{"id":1427,"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=\/wp\/v2\/posts\/1291\/revisions\/1427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=\/wp\/v2\/media\/1293"}],"wp:attachment":[{"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinbillington.com\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}