Jump to content
The Klipsch Audio Community
Sign in to follow this  
jason str

Hacked E-mail account

Recommended Posts

Somebody childish pr1ck with nothing better to do hacked my E-mail account, if you received a spam E-mail from me please disregard.

Share this post


Link to post
Share on other sites

How do you know it was hacked? Anybody can send an email with your address as the originator.

Share this post


Link to post
Share on other sites

How do you know it was hacked? Anybody can send an email with your address as the originator.

The E-mail was sent out to multiple contacts stored in my account including members here.

I was contacted by one of the recipients with a copy of the spam sent.

Share this post


Link to post
Share on other sites

You might have a Trojan Horse or a worm on your PC. One tip i was told years ago is to make up a fake email address that will come up to the top of your email contacts list... ie 0@myspam.com. By doing this with a fake email address the virus will not be able to send out anything to anyone you know as it won't get past the first one. Now maybe the viruses have gotten smarter and skip it I don't know, but it has worked for me.

  • Like 1

Share this post


Link to post
Share on other sites

It is still possible you weren't hacked. If you send emails to multiple recipients using CC rather than BCC, each recipient has the full email addresses of all recipients. If one of those computers has an email SMTP type virus, it can send itself to others. That is a way these viri procreate and get read if spam or phishing. They came from a trusted sender.

Share this post


Link to post
Share on other sites

You might have a Trojan Horse or a worm on your PC. One tip i was told years ago is to make up a fake email address that will come up to the top of your email contacts list... ie 0@myspam.com. By doing this with a fake email address the virus will not be able to send out anything to anyone you know as it won't get past the first one. Now maybe the viruses have gotten smarter and skip it I don't know, but it has worked for me.

Working on a scan right now.

It is still possible you weren't hacked. If you send emails to multiple recipients using CC rather than BCC, each recipient has the full email addresses of all recipients. If one of those computers has an email SMTP type virus, it can send itself to others. That is a way these viri procreate and get read if spam or phishing. They came from a trusted sender.

Never sent a E-mail to multiple recipients.

Share this post


Link to post
Share on other sites

you're not listening. email spamming can happen at the mail server level.. without any communication from your local computer. gone are the days where it's easily traced to XYZ virus. those methods are inefficient and too easily fixed, therefore hackers have moved higher up into the communication layer. it sucks, but theres likely nothing you can do to correct it.

THIS doesn't exist anymore..

Hack-the-planet.jpg

Share this post


Link to post
Share on other sites

Never thought about the mail server, i guess that can be another possibility.

I received a warning from Yahoo recently too telling me my account may have been compromised and changed my password to a more secure one figuring it would be safer but who knows.

Nothing valuable on my account anyways, why people bother i don't know.

Share this post


Link to post
Share on other sites

Hey Jason, just got your email. Thanks for the offer...but, I am married and don't go that way anyway. Good luck in your quest.

:D

Share this post


Link to post
Share on other sites

Never thought about the mail server, i guess that can be another possibility.

I received a warning from Yahoo recently too telling me my account may have been compromised and changed my password to a more secure one figuring it would be safer but who knows.

Nothing valuable on my account anyways, why people bother i don't know.

ya, that's nothing related to your computer. I get those emails from my wife and mother in law ever few weeks and just delete them. sucks, but aside from changing your password there's not much you can do in the case of hosted e-mail account breaches.

Share this post


Link to post
Share on other sites

Hey Jason, just got your email. Thanks for the offer...but, I am married and don't go that way anyway. Good luck in your quest.

:D

Your mail wasn't spam. ;) Send more pictures.

Share this post


Link to post
Share on other sites
. I get those emails from my wife and mother in law ever few weeks and just delete them.

By now there probably thinking your just turning them down and want some answers. :angry2:

Share this post


Link to post
Share on other sites

One of my pet peeves is that emails are sent plain text. IP protocol is most akin to radio waves on wire. They do not go to specific targets, but instead go to everybody on the network. They do not have borders until they hit a router or a switched port which target the next destination, everybody on each subnet or every hop can see (or sniff) everything that goes by. Email is insecure. An even worse culprit to insecurity is FTP. Even the user names and passwords are sent un-encrypted. Here is an example of the hops between me and yahoo's web server.

C:\>tracert www.yahoo.com
Tracing route to ds-any-fp3-real.wa1.b.yahoo.com [98.139.183.24]
over a maximum of 30 hops:
1 1 ms 1 ms 1 ms 192.168.1.1
2 * * * Request timed out.
3 10 ms 9 ms 9 ms cas-wv-cpe-216-20-128-139.cascable.net [216.20.128.139]
4 17 ms 14 ms 15 ms worldnet.att.net [12.126.51.97]
5 28 ms 26 ms 23 ms cr1.cgcil.ip.att.net [12.122.133.14]
6 27 ms 25 ms 23 ms cr1.cgcil.ip.att.net [12.122.133.233]
7 28 ms 27 ms 27 ms ggr4.cgcil.ip.att.net [12.122.133.33]
8 * * 28 ms att.net [192.205.37.150]
9 29 ms 29 ms 31 ms vl-3606-ve-230.ebr2.Chicago2.Level3.net [4.69.158.150]
10 33 ms 33 ms 30 ms ae-6-6.ebr2.Washington12.Level3.net [4.69.148.145]
11 31 ms 28 ms 29 ms ae-48-48.ebr2.Washington1.Level3.net [4.69.202.61]
12 30 ms 37 ms 30 ms ae-62-62.csw1.Washington1.Level3.net [4.69.134.146]
13 30 ms 32 ms 31 ms ae-1-60.edge1.Washington1.Level3.net [4.69.149.13]
14 58 ms 41 ms 35 ms Level3.net [146.82.54.206]
15 37 ms 38 ms 37 ms ae-0.pat1.nyc.yahoo.com [216.115.101.156]
16 46 ms 49 ms 54 ms ae-2.pat1.bfz.yahoo.com [216.115.100.26]
17 52 ms 45 ms 46 ms ae-3.msr1.bf1.yahoo.com [216.115.100.29]
18 48 ms 54 ms 46 ms xe-10-0-0.clr2-a-sat.bf1.yahoo.com [98.139.130.19]
19 55 ms 52 ms 50 ms et-18-25.fab7-1-gdc.bf1.yahoo.com [98.139.128.65]
20 50 ms 52 ms 49 ms po-15.bas2-7-prd.bf1.yahoo.com [98.139.129.243]
21 51 ms 51 ms 56 ms ir2.fp.vip.bf1.yahoo.com [98.139.183.24]
Trace complete.
C:\>
An email sent to you would take similar routes, although the SMTP server may be in another city since Yahoo is a global company. As you can see, potentially a minimum of:
  • my own ISP's subnet see's it
  • 5 AT&T subnet's
  • 6 Level 3 Communication subnets
  • 7 Yahoo subnet's
And all that on the outbound email. When the email(s) are retrieved, those hops are also exposures.
There is virtually no privacy any more, and definitely not with email. So as not to allow my own ISP subnet see my inbound and outbound email text, I log in through my webclient. That is as much as I can do with SPTM/POP3. The webclient is a secure server (https).
I simply do not understand why the hell there isn't a mandate to secure email and ftp. The public is not aware of the risk, and it is very troubling to me. The bad guys have been taking advantage for a long long time.
Edited by mustang guy

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...