إعلان علي الحاسوب

Leaked more than 711 million e-mail addresses

A French security researcher, Benko, discovered this week a large number of spam lists, totaling more than 711 million e-mail addresses. The researcher has been able to detect a Web bot of spam that has been used since 2016 onliner, The robot uses small pixel-sized images hidden in spam messages, which are designed to collect details about recipient computers and the server that contains those lists is located in the Netherlands.

Troy Hunt, the security expert, explained that the list contained a mind boggling amount of data on e-mail addresses and passwords stored in ordinary text files, along with the Weblog's spam onliner, a huge amount of SMTP authentication certificates used in e-mail These certificates are used to circumvent filters and spam filters, and have been obtained through other data leaks.

The possibility of having a user's email address within that data is not very worrying, but it means that the user should be more careful than the emails he or she opens, and there are a number of accounts at risk, These accounts are intended to send unwanted messages to more people. The list's data relate to a malicious software called Ursnif, a trojan that steals user names, passwords, bank account and payment card details

The number of e-mail messages in use is slightly less than the total number of authentication certificates on the list, users can see if they have been compromised by going to the website have i been pwned, As a result, the security expert added that there is no need to worry and fear for users who have strong passwords and use 2-step verification.

According to security researcher Benkow, the process of sending spam requires a huge list of SMTP authentication certificates, and there are only two options to do so either to create or buy that list, and that list is pumped after being compiled into the web robot for spam, To automate e-mail distribution. For example, Binko discovered about 2 million Facebook addresses collected by phishing campaigns.

Post a Comment

0 Comments