Though spammers are not logging into the compromised AOL user accounts, they are sending “spoof” messages to these users’ real address book contacts. How did spammers get access to AOL Mail address books in the first place? Unfortunately, this means that even if AOL users change their account passwords, these “spoof” messages can continue to be sent, as their address book contacts have likely been recorded. In reality, it is the spammer’s email address and servers that are being used to send the message, though they’ve made it appear as though the messages are originating from a legitimate sender, in this case AOL. This differs from a breach or a more traditional email account hack in that the spammers are not actually logging into AOL user accounts to craft and distribute malicious messages. Here’s the clincher, though-according to AOL, these emails do not actually originate from AOL Mail user accounts and do not have any contact with the AOL Mail servers. Spoofing is when a spammer sends out emails that have your address in the “From:” field, making it appear as though the message comes from you. It turns out, however, that the AOL system was not hacked, but rather spammers have been sending “spoof” messages appearing to originate from AOL Mail accounts. This weekend, news of a potential AOL Mail breach came to light, with users airing their frustrations on Twitter using the hashtag #AOLhacked. As Internet users everywhere are on heightened alert following the discovery of the password-compromising Heartbleed bug earlier this month, it appears as though some web surfers just can’t catch a break.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |