What's a Mailbomber? and what


 
Thread Tools Search this Thread
Special Forums IP Networking What's a Mailbomber? and what
# 1  
Old 02-07-2003
What's a Mailbomber? and what

what is a "mailbomber?" and what is the purpose of posting their ip? Just curious, how do you know you are under attack? things slow down? want to know in case it ever happens to anyone i know, thanks
# 2  
Old 02-07-2003
There may be some disagreement of terms here. To me, a mailbomber is someone who intentionally sends a lot of email to one or more carefully chosen victims. The victim can detect this by noting that his mailbox is full of trash from a single source.

This is different from a spammer, which is someone who sends an email message to every address that he can. A spammer actually would be delighted if every recipient loved the email. (Not at all likely though.) A mailbomber actually wants to be regarded as a problem and would be aghast if the mailbomb was somehow helpful.

Posting the ip address would probably be to invite retaliation. This might make more sense in the case of a spammer since the spammer has more victims. Also some people can block mail from a particular ip address, so it could be for defense.

You didn't ask for any advice here, but I feel that I must. Do not participate in or encourage any retaliation. You probably cannot be sure that the IP address is correct, and even if it is, nothing good will come from retaliation.
# 3  
Old 02-07-2003
To know about 'what is a mail bomber', please refer to this published paper that explains it quite well:

http://www.silkroad.com/papers/pdf/i...mail-bombs.pdf

We post their IP because what they do is illegal and folks should be aware of the identity of these cyber-criminals.

We knew of the attack because of high server loads, viewing log files and confirming the identity of the mail bomber with lsof -i -n

Perderabo, I am sure of the IP address. TCP is a connection oriented protocol and has two end-points. This can be easily confirmed. You are mistaken when you say that the IP address of hackers (or their proxies) cannot be confirmed when connection-oriented protocols are used. You are correct that it is very difficult to identify them with connectionless protocols are used. SMTP is a TCP protocol.

As far as a comment on counter-actions. Let's see..... a nation-state like Korea or another country does criminal action against another nation-states assets. The identity is confirmed. Counter-actions are appropriate, but in this case I have already checked. The attacker was operating behind a firewall with all incoming services and ports blocks. You can scan the IP address yourself and see. This is not a rookie.... rookies make mistakes Smilie

We simply list the IP addresses of confirmed attackers because it is the right thing to do.
# 4  
Old 02-07-2003
Quote:
Originally posted by Neo
Perderabo, I am sure of the IP address. TCP is a connection oriented protocol and has two end-points. This can be easily confirmed. You are mistaken when you say that the IP address of hackers (or their proxies) cannot be confirmed when connection-oriented protocols are used. You are correct that it is very difficult to identify them with connectionless protocols are used. SMTP is a TCP protocol.
Actually, I know that you can be sure of the IP address. But not everyone has your level of knowledge. Or your honesty. Some people would post an IP address that they know wasn't involved just to generate problems.

Rather than compare these actions to a war, I see them as crimes. Heck, they are crimes. If someone takes a baseball bat and smashes in your windshield, I would also discourage you from reciprocating. Both parties could wind up in jail.
# 5  
Old 02-07-2003
Hmmm...I gotta come in the front door once in a while. I usually bypass the menus. So I just noticed that announcement. I thought that this was a general thread. But I just saw that announcement so now I know what we're talking about.

Too bad announcements don't appear on the home page. I do look at that once in a while.
# 6  
Old 02-07-2003
Yes, you are right, in this world of cyber-uncertainly, people must be very careful and have positive-ID when considering countermeasures against cyberattacks.

It is possible for an attacker to fake the originating address of an attack and an unknowing defender might take action against the completely wrong party.

In this particular attack; I have found about 5 IP addresses attacking the site and all are static, verifiable and all come from Korean address space. All are behind a firewall with one one open <1024 IP port... POP3...... seems more than a coincident when all attackers are from the Korean IP land and all the platforms are tightly locked down.....
# 7  
Old 02-07-2003
Has any contact been made with the foreign ISP to verify that these attacks are not coming from servers that have been "owned" by an outside cracker?

It is interesting about the vernacular of mailbomber. In my experience back in the FidoNet days, a mailbomber was somebody who created a high recursed zip with the intent to take up space on the filesystem in an attempt of crashing the mail relay.
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

What are the differences between 'bash' and 'sh'

Hopefully this doesn't come off as too much of a "newbie" question or a flamebait. But I have recently begun working with a Sun Solaris box after having spent the past five years working with RedHat. From what i can tell, thing look fairly similar and the 'man' command is some help. But I've... (7 Replies)
Discussion started by: deckard
7 Replies

2. UNIX for Advanced & Expert Users

How to remove a file with a leading dash '-' in it's name?

Somehow someone created a file named '-ov' in the root directory. Given the name, the how was probably the result of some cpio command they bozo'ed. I've tried a number of different ways to get rid of it using * and ? wildcards, '\' escape patterns etc.. They all fail with " illegal option --... (3 Replies)
Discussion started by: GSalisbury
3 Replies

3. Email Antispam Techniques and Email Filtering

Procmail recipe: blocking 'unsubscribe and opt-out' messages....

Here is a crude procmail recipe that I quickly created (NOT a procmail recipe expert, btw) that has been catching lots of spam (current second after the charset_spam recipe posted earlier): :0B * .*If.you.do.not.wish.to.receive...* more_spam :0B * You.requested.to.receive.this.mailing... (0 Replies)
Discussion started by: Neo
0 Replies

4. IP Networking

BELKIN 'F5D5020' 16bit PCMCIA - FreeBSD HOWTO

Hey all, I've bought a few bits from Belkin who seem quite happy to support FreeBSD! Last time I bought a UPS from them and it's still going well :D I saw this on their website that the 16bit PCMCIA card was supported under FreeBSD: http://www.belkin.com/network/F5D5020.html I went to my... (0 Replies)
Discussion started by: WIntellect
0 Replies

5. UNIX for Dummies Questions & Answers

quoting echo 'it's friday'

echo 'it's friday' why appear the > (3 Replies)
Discussion started by: yls177
3 Replies

6. UNIX for Dummies Questions & Answers

HELP! The '/var/adm/message' file increase every few seconds???

Hi, guys, I have a big problem. I've got a sun solaris 4.1.4 workstation, and the /var/adm/message file will add one row every few seconds. It becomes a large file in a short time. I wander if there are some mistakes configuring the workstation. the /var/adm/message is as follow: ... (3 Replies)
Discussion started by: cloudsmell
3 Replies

7. UNIX for Advanced & Expert Users

Terminal 'Local Echo' lost on Modem Dial-out

Can anybody help me? I am developing a utility for automating message paging to a BT alphanumeric pager. I am using a USR 56K Fax-modem connected to /dev/cuab on a Sun Ultra-10. I am using the UNIX 'tip' utility to connect to the modem and I have configured the modem as follows: Baud Rate:... (2 Replies)
Discussion started by: mybeat
2 Replies

8. Shell Programming and Scripting

Clearify what it means under 'WHAT' when hit the 'w'-command

I wonder how I shall read the result below, especially 'what' shown below. The result was shown when I entered 'w'. E.g what is TOP? What is gosh ( what does selmgr mean?)? login@ idle JCPU PCPU what 6:15am 7:04 39 39 TOP 6:34am 6:45 45 45 TOP 6:41am ... (1 Reply)
Discussion started by: Aelgen
1 Replies

9. Programming

i can't use 'make' in my computer?

I need to compile a file,but 'make' does not work.please tell me how to use it or need which tools? (3 Replies)
Discussion started by: dsun5
3 Replies

10. UNIX for Dummies Questions & Answers

How to subtract 2 hours from 'date' in shell ( /bin/sh ) script ?

I write a sh script that zip and copy to tape all files that older then 2 hours. 1. The way I choose is - touch a file with "now - 2 hours", then use fine with '! -newer' 2. Do you have any other idea to do it ? tnx. (1 Reply)
Discussion started by: yairon
1 Replies
Login or Register to Ask a Question