[anti-abuse-wg] Mailman
- Previous message (by thread): [anti-abuse-wg] Mailman
- Next message (by thread): [anti-abuse-wg] Mailman
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Suresh Ramasubramanian
ops.lists at gmail.com
Wed Oct 24 12:35:19 CEST 2018
That's there. However this gang has generally operated by downloading out of date password dumps --srs ________________________________ From: anti-abuse-wg <anti-abuse-wg-bounces at ripe.net> on behalf of Andreas Schulze <andreas.schulze at datev.de> Sent: Wednesday, October 24, 2018 3:52 PM To: anti-abuse-wg at ripe.net Subject: Re: [anti-abuse-wg] Mailman Am 22.10.2018 um 07:50 schrieb ac: > > Hi All, > > I will be repeating this post on four Mailman mailing lists.... > > I received one of these: "I hacked your account, here is your password > and pay me bitcoin" scam emails - to andre at ox.co.za with the password I > used on anti-abuse-wg at ripe.net (and three other Mailman lists only...) > > As I use different passwords, change my passwords (up to now, except > for mailing lists), every 7 to 30 days, I am usually able to know > exactly where, when so that I can go look for the how, etc. As > unfortunately I used the same email and same password on four lists, I > do not know which list data has been compromised. there are two places a list password is stored. - @mailman itself - @your-mua by regular "this is your subsription overview" messages sent out by mailman. if you find a password that (you think) is current, what is the more likely place it was stolen? -- A. Schulze DATEV eG -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://lists.ripe.net/ripe/mail/archives/anti-abuse-wg/attachments/20181024/83a7e8a0/attachment.html>
- Previous message (by thread): [anti-abuse-wg] Mailman
- Next message (by thread): [anti-abuse-wg] Mailman
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]