SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Internet Security/Privacy Issues and Solutions

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: caly who started this subject1/16/2001 12:12:18 PM
From: caly   of 210
 
There was a very interesting "spam incident" that occurred over the weekend, and it could be a hint of what's to come. Here's how it went, and I was personally affected by it AT WORK.

On Saturday, this Korean investment organization kisc.org spammed a newsletter to what must have been a massive list of people. The first newsletter didn't result in any activity, but then on Monday, the exact same newsletter went out THREE times again. What resulted after that was about 50 irate e-mails to the entire list demanding to be removed. When people replied to the sender's e-mail address, they hit the entire list, which resulted in just more irate e-mail from people telling others not to reply to the whole list.

Very early on, one knowledgeable soul tried to stop the chaos by giving the true domain information...

The domain is owned by:
yss123@KOTRA.OR.KR
and is hosted by:
packet@SOBACK.KORNET.NET

but nobody seemed to get it. They just kept replying to the list.

Anyway, this is worst spam scenario I've ever seen. What's more disturbing is to see who was affected by it. There were numerous other people whose work addresses got it, including the webmaster of one very notable high tech company.

<EDIT>

Well, I just found out what happened. Not only did I get this e-mail, but our entire marketing department got it also. What apparently happened is that these spammers got a list of domains from somewhere, and sent the spam to info@<domain>.com. I just happen to be one of the recipients of the info request e-mails at my company. Bottom line, our corporate e-mail server got about 400 e-mails as a result of this spam.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext