Knowledge

Email bomb

Source 📝

212:
to trace back to the perpetrator, and potentially very destructive. A massive attack of this kind targeting .gov email addresses was observed in August 2016. The Email messages in the flood are not spoofed: these are typically confirmation emails for newsletters and subscriptions for legitimate Internet services. The attacker exploits web sites that allow Internet clients to register to some service with their Email address. The attacker registers the victim with its Email address to multiple such services, which as a result send Emails to the victim.
216:
without abandoning subscription forms. After a subscription form is filled out, the website would dynamically create a mailto link to itself. A legitimate user would then send a message to validate the request without receiving any email from the website. While the sender's email could be spoofed, the sender's SMTP IP address cannot. The list manager can therefore verify that the email in the form request matches the originating SMTP server in the validation message.
196:, the attacker instructs the botnet to send out millions of emails, but unlike normal botnet spamming, the emails are all addressed to only one or a few addresses the attacker wishes to flood. This form of email bombing is similar to other denial-of-service flooding attacks. As the targets are frequently the dedicated hosts handling website and email accounts of a business, this type of attack can be devastating to both services of the host. 25: 215:
In order to prevent this type of bombing, most email subscription services send a confirmation email to a person's inbox when that email is used to register for a subscription. However, even the confirmation emails contribute to the attack. A better defense would prevent websites from being exploited
211:
List linking, also known as "email cluster bomb", means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. The attack can be carried out automatically with simple scripts: this is easy, almost impossible
223:
signing up a specific email address to a multitude of services can be used to distract the view from important emails indicating that a security breach has happened elsewhere. If, for example, an Amazon account has been hacked, the hacker may contrive to have a flood of confirmation emails sent to
256:, mail server software was then configured to unpack archives and check their contents as well. A new idea to combat this solution was composing a "bomb" consisting of an enormous text file, containing, for example, only the letter 297:
have since been banned as a means of sending text bombs. The text messages may also lead to high phone bill charges on some mobile plans. Additionally, certain phone apps have also been created to prevent text bombs on Android OS.
260:
repeating millions of times. Such a file compresses into a relatively small archive, but its unpacking (especially by early versions of mail servers) would use a greater amount of processing, which could result in a
224:
the email address associated with the account to mask the fact that the Amazon shipment address has been changed and purchases have been made by the hacker.
199:
This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of each
440: 316: 567: 89: 659: 121:
This article is about denial-of-service attacks. For spikes of "reply all" messages on an email distribution list, see
61: 508: 108: 340: 176:. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by 68: 524: 46: 554:. 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE. pp. 286–293. 473:
Jakobsson, Markus; Menczer, Filippo (2010-01-01). Huang, Scott C.-H.; MacCallum, David; Du, Ding-Zhu (eds.).
75: 415: 42: 602: 294: 57: 393: 262: 181: 164:
There are three methods of perpetrating an email bomb: mass mailing, list linking and zip bombing.
145: 35: 629: 488: 548:
Schneider, Markus; Shulman, Haya; Sidis, Adi; Sidis, Ravid; Waidner, Michael (June 2020).
236:
is a variant of mail-bombing. After most commercial mail servers began checking mail with
220: 8: 237: 492: 82: 478: 274: 200: 141: 563: 504: 396:, Application Security, Industry Perspective, December 1st 2016, In: amperva.com/blog 270: 249: 245: 203:
sending a different message or employing stealth techniques to defeat spam filters.
555: 496: 285:
A "text bomb" is a similar variant of sending a large number of text messages over
177: 153: 559: 549: 500: 654: 639: 365: 648: 290: 173: 149: 122: 193: 172:
Mass mailing consists of sending numerous duplicate emails to the same
634: 152:
to distract the attention from important email messages indicating a
24: 483: 233: 180:. Email-bombing using mass mailing is also commonly performed as a 129: 317:"10 Types Of Cyber Crimes... And Another 10 You've Never Heard Of" 583: 266: 189: 185: 394:
How Registration Bots Concealed the Hacking of My Amazon Account
525:"Massive Email Bombs Target .Gov Addresses — Krebs on Security" 416:"Email bomb | Informatics Engineering | 2878 | p2k.unaki.ac.id" 253: 137: 547: 192:
and under the attacker's control. Similar to their use in
286: 241: 439:
Jakobsson, Markus; Menczer, Filippo (December 2003).
140:
to an address to overflow the mailbox, overwhelm the
188:; hierarchical networks of computers compromised by 219:A large number of confirmation emails initiated by 136:is a form of net abuse that sends large volumes of 49:. Unsourced material may be challenged and removed. 603:"Why Every Parent Needs To Know About Text Bombs" 646: 472: 438: 366:"Email Bombing and ways to protect yourself" 240:and filtering certain malicious file types, 277:if the server checks nested archive files. 584:"research!rsc: Zip Files All The Way Down" 388: 386: 482: 293:or online harassment. Apps online on the 109:Learn how and when to remove this message 600: 383: 144:where the email address is hosted in a 647: 475:Web Forms and Untraceable DDoS Attacks 314: 468: 466: 410: 408: 406: 404: 402: 280: 47:adding citations to reliable sources 18: 13: 184:by employing the use of "zombies" 14: 671: 630:CERT - Email Bombing and Spamming 623: 463: 441:"Untraceable Email Cluster Bombs" 399: 23: 594: 576: 477:. Springer US. pp. 77–95. 206: 167: 34:needs additional citations for 541: 517: 432: 358: 341:"The Return of Email Flooding" 333: 308: 289:. The technique is a means of 227: 1: 640:Diving into Email Bomb Attack 551:Diving into Email Bomb Attack 301: 7: 635:Email Cluster Bomb Research 601:Brenoff, Ann (2013-11-01). 560:10.1109/DSN48063.2020.00045 501:10.1007/978-0-387-73821-5_4 10: 676: 159: 120: 660:Denial-of-service attacks 295:Android operating system 269:file can even contain a 182:denial-of-service attack 146:denial-of-service attack 16:Malicious email abuse 43:improve this article 529:krebsonsecurity.com 493:2010nese.book...77J 238:anti-virus software 588:research.swtch.com 347:. 29 November 2018 275:infinite recursion 569:978-1-7281-5809-9 281:Text message bomb 263:Denial of Service 221:registration bots 119: 118: 111: 93: 667: 617: 616: 614: 613: 598: 592: 591: 580: 574: 573: 545: 539: 538: 536: 535: 521: 515: 514: 486: 470: 461: 460: 458: 456: 436: 430: 429: 427: 426: 412: 397: 390: 381: 380: 378: 377: 370:The Windows Club 362: 356: 355: 353: 352: 337: 331: 330: 328: 327: 321:www.silverbug.it 312: 114: 107: 103: 100: 94: 92: 51: 27: 19: 675: 674: 670: 669: 668: 666: 665: 664: 645: 644: 626: 621: 620: 611: 609: 607:Huffington Post 599: 595: 582: 581: 577: 570: 546: 542: 533: 531: 523: 522: 518: 511: 471: 464: 454: 452: 437: 433: 424: 422: 420:p2k.unaki.ac.id 414: 413: 400: 392:Dima Bekerman: 391: 384: 375: 373: 364: 363: 359: 350: 348: 339: 338: 334: 325: 323: 313: 309: 304: 283: 230: 209: 201:zombie computer 170: 162: 154:security breach 126: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 673: 663: 662: 657: 643: 642: 637: 632: 625: 624:External links 622: 619: 618: 593: 575: 568: 540: 516: 509: 462: 431: 398: 382: 357: 332: 306: 305: 303: 300: 282: 279: 271:copy of itself 229: 226: 208: 205: 169: 166: 161: 158: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 672: 661: 658: 656: 653: 652: 650: 641: 638: 636: 633: 631: 628: 627: 608: 604: 597: 589: 585: 579: 571: 565: 561: 557: 553: 552: 544: 530: 526: 520: 512: 510:9780387738208 506: 502: 498: 494: 490: 485: 480: 476: 469: 467: 450: 446: 442: 435: 421: 417: 411: 409: 407: 405: 403: 395: 389: 387: 371: 367: 361: 346: 342: 336: 322: 318: 311: 307: 299: 296: 292: 291:cyberbullying 288: 278: 276: 272: 268: 264: 259: 255: 251: 247: 243: 239: 235: 225: 222: 217: 213: 204: 202: 197: 195: 191: 187: 183: 179: 175: 174:email address 165: 157: 155: 151: 147: 143: 139: 135: 131: 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 610:. Retrieved 606: 596: 587: 578: 550: 543: 532:. Retrieved 528: 519: 474: 453:. Retrieved 448: 444: 434: 423:. Retrieved 419: 374:. Retrieved 372:. 2017-05-04 369: 360: 349:. Retrieved 345:Dark Reading 344: 335: 324:. Retrieved 320: 310: 284: 257: 231: 218: 214: 210: 207:List linking 198: 178:spam filters 171: 168:Mass mailing 163: 150:smoke screen 133: 127: 105: 96: 86: 79: 72: 65: 58:"Email bomb" 53: 41:Please help 36:verification 33: 315:Silverbug. 265:. A ZIP or 228:Zip bombing 123:email storm 99:August 2016 649:Categories 612:2017-12-30 534:2016-08-23 484:cs/0305042 425:2023-04-30 376:2019-04-25 351:2019-04-25 326:2019-04-25 302:References 273:, causing 134:email bomb 132:usage, an 69:newspapers 455:23 August 234:ZIP bomb 194:spamming 148:or as a 130:Internet 489:Bibcode 267:.tar.gz 190:malware 186:botnets 160:Methods 83:scholar 566:  507:  142:server 85:  78:  71:  64:  56:  655:Email 479:arXiv 445:Login 254:7-Zip 138:email 90:JSTOR 76:books 564:ISBN 505:ISBN 457:2016 62:news 556:doi 497:doi 451:(6) 287:SMS 250:Zip 246:RAR 242:EXE 156:. 128:On 45:by 651:: 605:. 586:. 562:. 527:. 503:. 495:. 487:. 465:^ 449:28 447:. 443:. 418:. 401:^ 385:^ 368:. 343:. 319:. 252:, 248:, 244:, 232:A 615:. 590:. 572:. 558:: 537:. 513:. 499:: 491:: 481:: 459:. 428:. 379:. 354:. 329:. 258:z 125:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Email bomb"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
email storm
Internet
email
server
denial-of-service attack
smoke screen
security breach
email address
spam filters
denial-of-service attack
botnets
malware
spamming
zombie computer
registration bots
ZIP bomb
anti-virus software
EXE
RAR

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.