On 28/08/2010 11:58, Michael Adams wrote:
On Saturday 28 August 2010 22:08, Mike Scott wrote:
An odd one this. I had some spam last night, received from a collab.net
mail relay, addressed to the account email address I use for logging
into the OOo issues system. That address is unique to that purpose and
never given out elsewhere, and a check search on google (web and groups)
for it returns no matches, so it's not exactly publicly available.

As is usual, it's not clear where the spam originated - the sending
email is a yahoo.hk address, which means zilch. It's all in a chinese
character set, with a stack of image attachments (which I've not opened)

So, how on earth did a spammer get hold of this unpublished (and not
exactly guessable) email addy, and why is collab.net routing this stuff
for him/her/them? Anyone else been so afflicted?

When was the last time you used chkrootkit on your linux box? Are those emails
secure or plain text to and from collabnet? No insecure email is safe from
harvesting of addresses in transit. You may want to consider disposable
addresses, gmail or similar.

I doubt the problem lies there. I'm not sure the address has ever been used for much actual email, just whatever collab.net needs for its own uses - and it's been a long time since I logged in (years+).

If it were a local security problem, I'd see assorted other unique-to-site email addresses (of which there are many) getting spam too - I don't. And it did definitely come via (or from) collab.net; spam resulting from a simple security leak most certainly wouldn't do that, it would follow the MX for my domain, ie straight here.

--
Mike Scott


---------------------------------------------------------------------
To unsubscribe, e-mail: discuss-unsubscr...@openoffice.org
For additional commands, e-mail: discuss-h...@openoffice.org

Reply via email to