You are viewing an archive of Victory Road.
Victory Road closed on January 8, 2018. Thank you for making us a part of your lives since 2006! Please read this thread for details if you missed it.
I haven't logged in here in several years, but what prompted me to post was this strange email I got just now. It's obvious it's just a spam message as the link redirects to a site that looks like Fox News, but all the images and links are replaced with some miracle weight loss drink that doesn't work.
Here's the contents of the message with all the recipients whited out:
![]()
Has anyone else on this forum received the same message? I noticed that there are a couple of names in the To list that I recognize; RehdBlob and HarryCat18 to be exact. Not sure if someone hacked these forums or they got into Cat's mail somehow.
If anyone has received this message, I ask that you delete it immediately. I've only managed to round up about 100 of the e-mail addresses it was sent to in order to issue an apology, so there are likely many others I missed. I've already changed my password.
I'm willing to bet whatever spambot managed to crack in sent a message to everyone I've ever e-mailed from that account from the last 11 years (when I registered the account). >_>
AH HA! Thank you, message headers!
Apparently, my account was not hacked. It was delivered by jeffc@st-charles.org operating on the St. Charles Borromeo Catholic Church (in Lima, OH) domain and attempted to be masked by being sent from my address.
x-store-info: *removed* Authentication-Results: hotmail.com; spf=none (sender IP is 65.17.128.152; identity alignment result is fail and alignment mode is relaxed) smtp.mailfrom=jeffc@st-charles.org; dkim=none (identity alignment result is pass and alignment mode is relaxed) header.d=aol.com; x-hmca=none header.id=cat333pokemon@aol.com X-SID-PRA: cat333pokemon@aol.com X-AUTH-Result: NONE X-SID-Result: NONE X-Message-Status: n:n X-Message-Delivery: Vj0xLjE7dXM9MDtsPTA7YT0wO0Q9MTtHRD0yO1NDTD0w X-Message-Info: *removed* Received: from bizmail01.wcoil.com ([65.17.128.152]) by BAY0-PAMC2-F3.Bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4900); Thu, 20 Feb 2014 15:56:04 -0800 Received: from mycomputer (Broadband-Dynamic-119-235-77-39.connect.com.fj [119.235.77.39]) (Authenticated sender: jeffc@st-charles.org) by bizmail01.wcoil.com (Postfix) with ESMTPA id 4DEDA2E82A0; Thu, 20 Feb 2014 18:55:47 -0500 (EST) From: "=?ISO-8859-1?Q?cat333pokemon=40aol.com?=" <cat333pokemon@aol.com> To: *addresses removed* Subject: =?ISO-8859-1?Q?cat333pokemon=40aol.com?= Date: Thu, 21 Feb 2014 12:55:47 +0100 MIME-Version: 1.0 X-mailer: Microsoft Office Outlook, Build 11.0.5510 Reply-To: cat333pokemon@aol.com Content-type: Multipart/mixed; boundary="50B60084_390367CB_boundary" Content-Description: Multipart message Return-Path: jeffc@st-charles.org Message-ID: <BAY0-PAMC2-F3zJOTfH0008d898@BAY0-PAMC2-F3.Bay0.hotmail.com> X-OriginalArrivalTime: 20 Feb 2014 23:56:04.0347 (UTC) FILETIME=[508E34B0:01CF2E97] --50B60084_390367CB_boundary Content-type: text/html; charset=UTF-8 Content-Transfer-Encoding: Quoted-printable Content-Disposition: inline Content-Description: HTML text
4 – Magmaster12, NismoZ, Twiggy, Eagles|
That's...a good question. Guess I did get hacked somehow, then. Regardless, I changed my password so it shouldn't happen again.
|
3 – Dragonite, Cat333Pokémon, BluFire1337The spam message was delivered to pretty much everyone I ever sent a message to, from my AOL e-mail account. If I never sent you an e-mail through AOL (or added you to my contacts there), then you didn't get one. It did not use the e-mail addresses stored in Victory Road's database.
|
Hehe.
Makes me wonder what's going on with AOL's security, to be honest. |
Return-Path: <SRS0=aBD8Ci=XY=corrum.ca=pdufour@eigbox.net> Received: from [190.19.254.34] (port=2413 helo=mycomputer) by bosauthsmtp06.eigbox.net with esmtpa (Exim) id 1WGA0i-0007je-1k; Wed, 19 Feb 2014 11:28:37 -0500
Return-Path: <ggkuhaka@publicservice.go.ke> Received: from mycomputer (79-100-190-70.btc-net.bg [79.100.190.70]) by mail.publicservice.go.ke (Postfix) with ESMTPSA id 5F1B326854A; Wed, 19 Feb 2014 18:57:25 +0300 (EAT)
Received: from blu0-omc2-s12.blu0.hotmail.com (blu0-omc2-s12.blu0.hotmail.com [65.55.111.87]) by mtaiw-mab05.mx.aol.com (Internet Inbound) with ESMTP id 930FB70000081 for <cat333pokemon@aol.com>; Fri, 14 Feb 2014 21:15:08 -0500 (EST) Received: from BLU168-W39 ([65.55.111.71]) by blu0-omc2-s12.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 14 Feb 2014 18:15:08 -0800
Bumping this thread because it happened again. Same sort of message as the first one, only this time it links to a fake version of Women's Health and my browser's anti-fraud thing actually caught it.
Edit: This spam message, while all the recipients stayed the same, had different headers than the first.
I don't get it. My contacts list is completely empty now, and I changed my password since then. Judging by this part of the header in the PM you sent me...
Received: from mail-1.cc.uic.edu (mail-1-456.cc.uic.edu. [128.248.156.182])
by mx.google.com with ESMTPS id a7si4397701iga.43.2014.04.08.10.28.20
for <multiple recipients>
(version=TLSv1 cipher=RC4-SHA bits=128/128);
Tue, 08 Apr 2014 10:28:20 -0700 (PDT)
Received-SPF: neutral (google.com: 128.248.156.182 is neither permitted nor denied by domain of cat333pokemon@aol.com) client-ip=128.248.156.182;
Authentication-Results: mx.google.com;
spf=neutral (google.com: 128.248.156.182 is neither permitted nor denied by domain of cat333pokemon@aol.com) smtp.mail=cat333pokemon@aol.com
Received: from uic.edu (dsl-189-241-239-129-dyn.prod-infinitum.com.mx [189.241.239.129] (may be forged))
(authenticated bits=0)
|
Nous sommes desoles de vous informer que votre message n a pas pu etre remis a un ou plusieurs de ses destinataires. Ceci est un message automatique genere par le serveur mwinf5d27.orange.fr. Merci de ne pas y repondre. This is the mail system at host mwinf5d27.orange.fr. I'm sorry to have to inform you that your message could not be delivered to one or more recipients. The mail system <*removed*>: host yahoo.com[66.196.118.37] said: 554 Message not allowed - [PH01] Email not accepted for policy reasons. Please visit http://postmaster.yahoo.com/errors/postmaster-27.html [120] |
Just a quick update. I received the following message from AOL:
|
Dear AOL User, At AOL, we care deeply about the safety and security of your online experience. We are writing to notify you that AOL is investigating a security incident that involved unauthorized access to AOL's network and systems. Recently, our systems alerted us to an increased incidence of email users receiving spam emails from "spoofed" AOL email addresses. AOL's security team immediately began investigating the cause of the spoofed emails. Spoofing is a tactic used by spammers to make it appear that the message is from you in order to trick the recipient into opening it. These emails do not originate from the AOL Mail system – the addresses are just edited to make them appear that way. AOL is working with other email providers like Gmail, Yahoo! Mail and Outlook·com to stamp out spoofing across the industry, and we have implemented measures that will significantly limit its future occurrence. Although our investigation is still underway, we have determined that there was unauthorized access to AOL users' email addresses, postal addresses, contact information (as stored in the AOL Mail "Address Book"), encrypted account passwords, and encrypted answers to security questions that we ask when a user resets his or her password. We believe spammers have used this contact information to send spoofed emails that appeared to come from roughly 2% of our email accounts. Importantly, at this point, we have no indication that the encryption on the passwords or the answers to security questions was broken. Likewise, there is no indication that this incident resulted in disclosure of users' financial information, including debit and credit cards, which is also fully encrypted. Nevertheless, as a precautionary measure, we strongly encourage you to reset your password used for any AOL service and, when you do so, you should take the time to change your account security question and answer. You may reset your password and account security question at account.aol.com. In addition, there are steps you can take to protect yourself from cyber risks. They include:
If you have any further questions, additional information and an extensive Q&A can be found at faq.aol.com. We apologize for any inconvenience, and we are addressing the situation as quickly and forcefully as we can. Bud Rosenthal, AOL Membership Group CEO Privacy Policy | Customer Support ©2014 AOL, Inc. All Rights Reserved. |
2 – Eagles, PokeRemixStudio