spamhaus

@spamhaus@infosec.exchange

The Spamhaus Project's aim is to change behavior for the good of the internet. We do this by being the authority on IP and domain reputation. This intelligence enables us to shine a light on malicious activity, educate and support those who want to change for the better, and hold those accountable that don’t. We do this together with a like-minded community.

Our researchers and threat hunters apply machine learning, heuristics, and manual investigations to big data shared by the wider internet community and beyond. This detailed analysis enables a reputation to be applied to IP addresses and domains the teams are observing. This rich data is used for attribution, protection, and insight and is shared with the community.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

spamhaus, to community

🎉 🎉 We are thrilled to share that the Threat Intel Community Portal has reached a significant milestone - 1,000,000 submissions!

And we want to say a massive THANK YOU.

In less than four months, we have received 1 million contributions of suspicious IPs, domains, URLs, and emails!

Whether from occasional contributors or organizations sharing large volumes of data via API, the mission is the same: to make the internet a safer place.

And believe us when we say every contribution counts, for it’s the diversity that adds to the strength of the community.

We owe this achievement to all our contributors, so please, take a bow and THANK YOU!

Interested in becoming a contributor?

Find out more here 👉 https://submit.spamhaus.org

spamhaus, to random

❗REMINDER | Abuse desks, Trust & Safety Teams and Senders!

Later this month Spamhaus Blocklist (SBL) listings will be moving from www.spamhaus.org to the Spamhaus IP and Domain Reputation Checker:

check.spamhaus.org

Make you know how listing notifications will change and where to view SBL listings - learn more here 👇
https://www.spamhaus.org/news/article/825/spamhaus-blocklist-sbl-listings-are-moving

spamhaus, to Cybersecurity

❗SCAM UPDATE | It’s been over 5 months and Philippine National Police central mailservers continue to send advance fee fraud scam emails. Now complete with a barrage of contentless "I hope this message finds you well " removal requests.

But there's more.....

Spamhaus researchers are observing two recently uncovered "dating scams" (see SBL listings): https://www.spamhaus.org/sbl/query/SBL628058

Scam 1 targets German BDSM lovers 👀, while scam 2 (from a "Pussy_Esmeralda_3" 😼) targets Italian men....

Interestingly, the "Reply-To address" which is the only spam payload is a '@pnp.gov.ph' address. This strongly suggests spammers have obtained a password, made the mailbox inaccessible to the legit owner, and are using it to interact with the scam victims.

Despite a number of SBL listings Philippine National Police still appear to be unaware of the situation - let's hope this information reaches the right people to prompt action. ✅

spamhaus, to random

What do you get when you cross a truck load of clowns with internet abuse?

🤡 Clown Grade Network Address Translation a.k.a. CGNAT....

A sneaky way of hiding a bunch of devices behind a single IP, making it impossible to identify who's responsible for what! Because of this, miscreants have access to a whole pool of IPs enabling spamming and other malicious activities....... and the worst part is, many users don't even know 😨

📢 Internet service providers - learn more about this issue and what you can do to protect your users:

https://www.spamhaus.org/news/article/824/the-conundrum-that-is-the-modern-use-of-nat-at-a-carrier-grade-level

spamhaus, to random

As we look back on 2023, we want to take a quick moment to say thank you!

The continued support of our community is deeply appreciated as we continue to strive to make the internet a safer place.

Wishing you a Merry Christmas and a Happy Holidays from all at The Spamhaus Project!

spamhaus, to random

🦆🤖 Qakbot makes a return....a not-so-welcome Christmas present!

Spamhaus researchers are observing low-volume Qakbot campaigns targeting specific business sectors. But, we do have some positive news....

Many of the observed botnet controllers are now offline, and the remaining ones are already known as rogue ISPs, and listed on the Spamhaus Extended DROP List 👉 https://www.spamhaus.org/drop/

👀 Watch this space; if anything changes, we'll keep you updated!

spamhaus, to random

🎉​ And we’re on Mastodon!

If you’re new to The Spamhaus Project, check out our bio above 🔝​

Ultimately, we’re here to build a community. A community of like-minded individuals, who want to make the internet a safer place. On Mastodon, we’ll be sharing latest threat intelligence from our researchers and threat hunters, and we’d like to invite you to do the same….

Earlier this month, we launched our Threat Intel Community, giving anyone the ability to submit malicious domains, IPs, email source codes, or URLs to Spamhaus through our user-friendly portal.

If you’re curious to know more, read this blog:
https://www.spamhaus.org/news/article/821/want-to-submit-data-be-our-guest

Or visit the Threat Intel Community here:
https://submit.spamhaus.org

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • provamag3
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • anitta
  • modclub
  • megavids
  • lostlight
  • All magazines