Monday, December 11, 2017

Over 711 Million Email Addresses Exposed From Spam Bot Server

spam-emails

SpamBot-A massive database of 630 million email addresses used by a spambot to send large amounts of spam to has been published online in what appears to be one of the biggest data dumps of its kind.

A French security researcher, who uses online handle Benkow, has spotted the database on an “open and accessible” server containing a vast amount of email addresses, along with millions of SMTP credentials from around the world.

The database is hosted on the spambot server in Netherlands and is stored without any access controls, making the data publicly available for anyone to access without requiring any password.

 

According to a blog post published by Benkow, the spambot server, dubbed “Onliner Spambot,” has been used to send out spams and spread a banking trojan called Ursnif to users since at least 2016.

Ursnif Banking Trojan is capable of stealing banking information from target computers including credit card data, and other personal information like login details and passwords from browsers and software.

spam-emails

“Indeed, to send spam, the attacker needs a huge list of SMTP credentials. To do so, there are only two options: create it or buy it,” Benkow said. “And it’s the same as for the IPs: the more SMTP servers he can find, the more he can distribute the campaign.”

As the researcher explained, he found “a huge list of valid SMTP credentials”—around 80 millions—which is then used to send out spam emails to the remaining 630 million accounts via internet provider’s mail servers, making them look legitimate that bypass anti-spam measures.

The list also contains many email addresses that appear to have been scraped and collected from other data breaches, such as LinkedIn, MySpace and Dropbox.

Check Also

Equifax Data Breach: Steps You should Take to Protect Yourself

Equifax has suffered one of the largest data breaches in history that has left highly …

Leave a Reply

Your email address will not be published. Required fields are marked *