Featured Article

We found a massive spam operation — and sunk its server

Five million emails in ten days

Comment

Image Credits: Getty Images

For ten days in March, millions were caught in the same massive spam campaign.

Each email looked like it came from someone the recipient knew: the spammer took stolen email addresses and passwords, quietly logged into their email account, scraped their recently sent emails and pushed out personalized emails to the recipient of that sent email with a link to a fake site pushing a weight loss pill or a bitcoin scam.

The emails were so convincing more than 100,000 people clicked through.

We know this because a security researcher found the server leaking the entire operation. The spammer had forgotten to set a password.

Security researcher Bob Diachenko found the leaking data and with help from TechCrunch analyzed the server. At the time of the discovery, the spammer’s rig was no longer running. It had done its job, and the spammer had likely moved onto another server — likely in an effort to avoid getting blacklisted by anti-spam providers. But the server was primed to start spamming again.

Given there were more than three million unique exposed credentials sitting on this spammer’s server — hosted on intelimost.com, we wanted to secure the data as soon as possible. With no contact information for the spammer — surprise, surprise — we asked the hosting provider, Awknet, to pull the server offline. Within a few hours of making contact, the provider nullrouted the server, forcing all its network traffic into a sinkhole.

TechCrunch provided a copy of the database to Troy Hunt. Anyone can now check breach notification site Have I Been Pwned to see if their email was misused.

But the dormant server — while it was still active — offered a rare opportunity to understand how a spam operation works.

The one thing we didn’t have was the spam email itself. We reached out to dozens of people to ask about the email they received. Two replied — but only one still had a copy of the email.

The email sent by the spammer. (Image: supplied)

“The same mail appeared on three occasions,” said one of the recipients in an email to TechCrunch. “The subject was related to an email I had sent previously to that person so the attacker had clearly got access to his mailbox or the mail server,” the victim said.

The email, when clicked, would direct the recipient through several websites in quick succession to determine where they were located, based off their IP address. If the recipient was in the U.S., they’d be pushed to a fake CNN site promoting a bogus health remedy. In this case, the spammer was targeting U.K. residents — and most were directed to a fake BBC page promoting a bitcoin scam.

One of the fake page.s (Screenshot: TechCrunch)

The spammer had other servers that we had no visibility into, but the exposed server revealed many of the cogs and machinery to the operation. The server, running an Elasticsearch database, was well-documented enough that we found one of the three spam emails sent to our recipient.

This entry alone tells us a lot about how the spam operation worked.

A database record of one email sent by the spammer. (Screenshot: TechCrunch)

Here’s how it works. The spammer logs into a victim’s @btinternet.com email account using their stolen email address and password. The scammer pulls a recently sent email from their victim’s email server, which feeds into another server — like inbox87.host and viewmsgcs.live — tasked with generating the personalized spam email. That email incorporates the subject line of the sent email and the target recipient’s email address to make it look like it’s being sent from the real person.

Once the message is ready to send, it’s pushed through a proxy connection, designed to mask where the email has come from. The proxy server is made up of several cell phones, each connecting to the internet over their cellular connection.

Each spam message is routed through one of the phones, which occasionally rotates its IP address to prevent detection or being flagged as a spammer.

Here’s what that proxy server looks like.

The proxy server comprised of several cell phones with rotating IP addresses. (Screenshot: TechCrunch)

Once the spam message leaves the proxy server, the spam message is pushed through the victim’s own email provider using their email address and password, making it look like a genuine email to both the email provider and the recipient.

Now imagine that hundreds of times a second.

Not only was the spammer’s Elasticsearch database leaking, its Kibana user interface was also exposed. That gave the spammer a detailed at-a-glance look at the operation in action. It was so granular that you could see which spam-sending domains were the most efficient in tricking a recipient into clicking the link in the spam email.

The spammer’s Kibana dashboard, displaying the operation at a glance. (Screenshot: TechCrunch)

Each spam email includes a tracker in the link that fed information back to the spammer. In bulk, that allows the spammer to figure out which email domain — like outlook.com or yahoo.com users — is more likely to click on a spam email. That can also indicate how an email provider’s spam filter acts. The greater number of clicks, the more likelihood of its spam going through — allowing the spammer to target specific email domains in the future.

The dashboard also contained other information related to the spam campaign, such as how many emails were successfully sent and how many bounced. That helps the spammer home in on the most valuable logins in the future, allowing them to send more spam for lower bandwidth and server costs.

In all, some 5.1 million emails were sent during the 10-day campaign — between March 8 and March 18, with some 162,980 people clicking on the spam email, according to the data on the dashboard.

It’s not the first time we’ve seen a spam operation in action, but it’s rare to see how successful it is.

“This case reminds me on several other occasions I reported at some points in the past — when malicious actors create a sophisticated system of proxying and logging, leaving so much tracks to identify their patterns for authorities in the investigations to come,” Diachenko told TechCrunch. “This shows us — again! — how important a proper cyber hygiene should be.”

What’s clear is that the spammer knows how to cover their tracks.

The language settings in the Kibana instance suggested the spammer may be based in Belgium. We found several other associated spamming domains using data collected by RiskIQ, a cyberthreat intelligence firm, which scours the web for information. Of the domains we found, all were registered with fake names and addresses.

As for the server itself, the provider said it was possibly hacked.

“This was a resold box and the customer already responded to the abuse forward saying it was supposed to have been terminated long ago,” said Awknet’s Justin Robertson in an email to TechCrunch.

And we still can’t figure out where the email addresses and passwords came from used to send the spam. Only 45 percent of emails were already in Have I Been Pwned, ruling out the possibility that all of the passwords were stolen from credential stuffing.

Since the hosting provider pulled the spammer’s server offline, several of their fake sites and domains associated with the spam campaign no longer load.

But given the spread of domains and servers propping up the campaign, we suspect the sunken server is only a single casualty in an otherwise ongoing spam campaign.


Got a tip? You can send tips securely over Signal and WhatsApp to +1 646-755–8849. You can also send PGP email with the fingerprint: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

More TechCrunch

Update: Authorities have yet to access the inside of the sunken yacht, and Mike Lynch is still classified as missing. Other details have emerged in the interim. The accident appears…

Mike Lynch, recently acquitted in HP-Autonomy fraud case, is missing after yacht capsized off Sicily (updated)

Global technology giants are pushing back against attempts by India’s telecom networks to bring internet services under stricter regulation, rejecting arguments that such measures are necessary to create a “level…

US tech giants fight Indian telcos’ bid to regulate internet services, pay for network usage

Pakistani startup PostEx is entering Saudi Arabia as first global market after hitting $21 million ARR in the South Asian nation.

Pakistan’s PostEx to enter new markets, starting with Saudi Arabia

The AI boom is fueling the demand for data centers and, in turn, driving up water consumption. (Water is used to cool the computing equipment inside data centers.) According to…

Demand for AI is driving data center water consumption sky high

The group honking was an unintended consequence of Waymo’s tech.

The Waymo robotaxi honking problem has been resolved for real this time

OpenAI and Anthropic spend billions of dollars a year training models like GPT-4 and Claude, but competitive price dumping is making the business around these platforms rather precarious. Aidan Gomez,…

What margins? AI’s business model is changing fast, says Cohere founder

Hello, and welcome back to TechCrunch Space. Did you hear? Bridgit Mendler will be joining me onstage at this year’s TechCrunch Disrupt to talk all things ground stations. She’s just…

TechCrunch Space: Spending less

What’s the point of chatting with a human-like bot if it’s an unreliable narrator — and has a colorless personality? That’s the question I’ve been turning over in my head…

Gemini Live could use some more rehearsals

Zoom on Monday announced a new single-user webinar feature that caps out at 1 million attendees. The addition comes less than a month after the #WinWithBlackWomen fundraiser for Vice President…

Now a million people can watch you fumble Zoom’s screen-share settings at once

On Sunday, former President Donald Trump posted a collection of memes on Truth Social — the platform owned by his media company — that make it seem like Taylor Swift…

Could Trump’s AI-generated Taylor Swift endorsement be illegal?

Few truly autonomous systems are deployed on the battlefield, but one startup is looking to change that with robotic systems that use cooperative behavior to boost troops’ intelligence and tactical…

Swarmbotics founders grew ‘obsessed with robot swarms’ and now plan to bring them to the battlefield

Former a16z-investor Balaji Srinivasan has booked out an island in Singapore to create his own “Network School.”

Former a16z VC Balaji Srinivasan obtained a private island for his new longevity ‘technocapitalist’ school

The flight tracking company says the misconfiguration exposed customer names, addresses, and pilot’s data, as well as Social Security numbers.

FlightAware warns that some customers’ info has been ‘exposed,’ including Social Security numbers

Over 30% of 7- to 9-year-olds have an X account, according to a new report.

A surprising number of ‘iPad Kids’ are on X, study finds

Apple Podcasts can now be streamed from the web. Apple announced on Monday that its Apple Podcasts app is now available on all major web browsers (Chrome, Edge, Firefox, and…

Apple Podcasts launches on the web

Historic vehicles, flowing champagne and fashion have dominated the events at Monterey Car Week for decades now. But a change is afoot: EVs, tech-centric vehicles, startups and a heavy dose…

From a $2.5 million hyper car to a Spanish track-ready EV, here were the most interesting EVs at Monterey Car Week

The clock is ticking! You’ve got just 5 days left to lock in discounted tickets for TechCrunch Disrupt 2024. Save up to $600 on individual ticket types. This limited-time offer ends…

5 days left to secure ticket savings for TechCrunch Disrupt 2024

General Motors is cutting around 1,000 software workers around the world in a bid to focus on more “high-priority” initiatives like improving its Super Cruise driver assistance system, the quality…

GM cuts 1,000 software jobs as it prioritizes quality and AI

Popular iPad design app Procreate is coming out against generative AI, and has vowed never to introduce generative AI features into its products. The company said on its website that…

Procreate takes a stand against generative AI, vows to never incorporate the tech into its products

ElevenLabs, which develops AI-powered tools to create and edit synthetic voices, is making its Reader app available globally with support for 32 languages.

ElevenLabs’ text-to-speech app Reader is now available globally

AMD is acquiring ZT Systems, which provides compute design and infrastructure for AI, cloud and general purpose computing, for $4.9 billion.

AMD to acquire infrastructure player ZT Systems for $4.9B to amp up its AI ecosystem play

Amazon is considering shifting its payments offerings in India into a standalone app, three sources familiar with the matter told TechCrunch, as the e-commerce giant aims to boost usage of…

Amazon considers moving Amazon Pay into a standalone app in India

Root helps food and beverage companies collect primary data on their agricultural supply chains. 

As CO2 emissions from supply chains come into focus, this startup is aiming at farms

In May, the African fintech processed up to $70 million in monthly payment volume.

Waza comes out of stealth with $8M to power global trade for African businesses

This post contains spoilers for the movie “Alien: Romulus” In the long-running “Alien” movie franchise, the Weyland-Yutani Corporation can’t seem to let go of a terrible idea: It keeps trying…

Digitally resurrecting actors is still a terrible idea

Thomas Ingenlath is having perhaps a little too much fun in his Polestar 3, silently rocketing away from stop signs and swinging through tightening bends, grinning like a man far…

With the Polestar 3 now ‘weeks’ away, its CEO looks to make company ‘self-sustaining’

Some parents have reservations about the South Korean government’s plans to bring tablets with AI-powered textbooks into classrooms, according to a report in Financial Times. The tablets are scheduled to…

South Korea’s AI textbook program faces skepticism from parents

Featured Article

How VC Pippa Lamb ended up on ‘Industry’ — one of the hottest shows on TV

Season 3 of “Industry” focuses on the fictional bank Pierpoint and blends the worlds — and drama — of tech, media, government and finance.

How VC Pippa Lamb ended up on ‘Industry’ — one of the hottest shows on TV

Featured Article

Selling a startup in an ‘acqui-hire’ is more lucrative than it seems, founders and VCs say

Selling under such circumstances is often not as poor of an outcome for founders and key staff as it initially seems. 

Selling a startup in an ‘acqui-hire’ is more lucrative than it seems, founders and VCs say

While the rapid pace of funding has slowed, many fintechs are continuing to see growth and expand their teams.

These  fintech companies are hiring, despite a rough market in 2024