Nicole, leave me alone, damn it! #spam #mastodon #fediverse
A new account Nicole That should be reported and blocked
nicole53@chinanews.social
don't hesitate to tag the group @spamalert to inform everyone
It seems finally (?) I got nicoled too... I got the message on my single user GoToSocial account.
The account is: nicole53@chinanews.social
I remember I saw somebody who has a gist with the already used accounts. Can someone link me, so I can block all the other accounts too?
Možná jste taky zaregistrovali spamující účet, co se vydává za „Nicole“. Chodí od ní otravné zprávy do DMs. Už jsem ji několikrát blokoval, ale pokaždé se registruje na jiné instanci.
Snažím se to průběžně blokovat, ale kdyby vám to taky přišlo, rovnou blokněte a případně nahlaste.
#Fediblock #CZfedi #spam
«Los datos de la lista Robinson parecen haber sido filtrados»
https://proxy.jesusysustics.com/2025/04/25769/
Me temo que va a tocar recoger cable tras años recomendando inscribirse en la lista Robinson. Durante años Se ha mostrado como una herramienta muy útil contra empresas legales (o con miedo a las denuncias), pero no contra aquellos entes maliciosos que solo buscan timarnos. Sin embargo, ahora el problema es que parecen haber filtrado una enorme base de datos de usuarios inscritos y eso solo puede significar que pronto recibiremos aún más llamadas y mensajes de spam.
Datos de más de 600.000 usuarios entre los que tenemos información muy sensible: DNI, nombre y apellidos, números de teléfono, correos electrónicos… información ideal para hacer que los timos sean más convincentes.
Los adultos estamos aprendiendo a marchas forzadas de los más jóvenes desconfiando cada vez más de las llamadas con número desconocido (no digamos ya ocultos) y este grave problema de seguridad solo puede acelerar este proceso.
#filtración #listaRobinson #llamadaTelefónica #privacidad #publicidadIndeseable #spam
Also jetzt hab ich doch echt kurz überlegt, ob das wirklich sein kann, dass ich 1,95 Euro zahlen soll, damit mir weiterhin E-Mails zugestellt werden... und wollte mich schon aufregen, dass man als zahlender Kunde nun auch noch extra zahlen muss und so.
Aber gut gemacht ist diese Spam-Mail ja...
AkiraBot’s Use of GPT Models in Web Channel Abuse
Here is a full list of domains, websites and services used by people to send spam, spam and other spam messages:. and here is the full set of names: (Snob):.
Pulse ID: 67fa493f49755096b93cd648
Pulse Link: https://otx.alienvault.com/pulse/67fa493f49755096b93cd648
Pulse Author: cryptocti
Created: 2025-04-12 11:06:39
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
Aus gegebenem Anlass: Das sind Probleme, die ich früher nie hatte, eine mit lauter Müll verstopfte Festplatte
Aus #Klaviersdelikte von #BodoWartke.
YouTube: https://www.youtube.com/watch?v=btsh1qNOIEA
Invidious: https://inv.nadeko.net/watch?v=btsh1qNOIEA
AkiraBot Spammed Websites by using Evasion Techniques
Akirabot is a sophisticated Python framework has successfully targeted websites
using advanced techniques to bypass security measures and deliver AI-generated
spam.
Pulse ID: 67f87aa1dffcefb96c594f87
Pulse Link: https://otx.alienvault.com/pulse/67f87aa1dffcefb96c594f87
Pulse Author: cryptocti
Created: 2025-04-11 02:12:49
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
When clicked, the button delivers malware, but it's an unexpected payload: A client installer for the commercial remote-access tool ConnectWise.
8/
This is where I tell you: don't do this! I am a trained professional. I click all the bad links so you don't have to. I am going to show you what happens next.
A button appears on this page, labeled "Access Your Statement." The site serving up this payload delivers a file named "Social Security Statement Documents [six digit random number].exe"
7/
Finally the target lands on a page on the InMotion site that closely resembles the look-and-feel of the content in the email message.
The page tells the visitor, in part "Download your statement as a PDF file" and "For security reasons, we recommend accessing your statement through your secure device."
Spoiler alert: It was not a PDF file.
(Edit: A reader informs me that this appears to be the hosting space used by the temp agency website, and that for whatever reason, the URL appears differently here.)
6/
The target's browser then lands on another website, hosted by a large hosting service, InMotion Hosting. As with the temp agency website, the attackers have set up multiple URLs on this site, where the first URL performs a 302 redirect to go to the second URL, for no apparent reason other than to create the URL equivalent of a Rube Goldberg contraption.
5/
That link then immediately 302 redirects the target's browser to a link on a second website, one that belongs to a temp agency based in the US state of Maryland.
The attackers have created two URLs on this company's site for this purpose. The first one redirects to the second one.
Again, the site appears to have been compromised and used specifically for the purpose of obfuscating the redirection chain.
4/
The first 302 redirect points to a page on a website belonging to a small business that has, apparently, been compromised and abused for this purpose.
3/