Wow, what is going on? In the last three days, I have gotten over 70 spam emails, some purporting to come from me! Bad spelling, phony gift cards, **bleep** enhancement, sexual positions, you name it.
It had been bad about 2 months ago, and then everything cleared up. Now spam has come back with a vengeance - and in huge quantities.
Has HughesNet turned off its spam filters? These last three days have been horrible! All the emails go to my spam folder, but why can't HughesNet reject them before they are delivered to me at all?
Frustrated in Alabama
Only 70?
Chances are you've used your email to sign up for something and they've sold their email list, you've posted it somewhere on an open message board and it was scraped, or it was obtained by some other means.
Sometimes all of the spam sources go into overdrive, and they have been ramping up for about a week now, but nothing like the zombie spam storm at the end of July/beginning of August.
I can tell you that the majority of it is coming from unsecured servers in China, Vietnam, Brazil (Claro), Russia (lucky.net), Germany (MyLoc) and the US (Nexeon Tech, Eonix, Interserver). Blocking anything coming from those IP groups kills about 90% of it. The rest (mostly the drug and sex ones) come from people with infected phones and computers that are spamming unbeknownst to them upon command, hence the term 'zombie spam'.
I get so much spam it's ridiculous. And, unfortunately, I had my main email account hacked a few years back, and ever since then I receive spam email that looks like it came from my own email address. It's ludicrous. Every day I get about ten or fifteen emails from my own address, yet not actually sent from my account (though about five or six were when it was hacked). It's awful.
If my main email wasn't the first email account I ever opened (mid/late 90s), I would simply change it. I'm too sentimental to do that. LOL.
There are several spam types that use valid emails that were scraped from web sites or web sites that have used a script to obtain your addressbook. They do this so they can be used in phishing emails as well as to get you to click some other site or open some attachment that infects you with something really nasty.
Sometimes this is to make you one of the zombie horde, other times it's to install a keystroke stealer for when you login to your bank. Incidentally, your phone is not exempt either, as I see a tremendous amount of zombie spam coming from mobile phone systems.
I have had my own server and associated email addresses for several decades as I used to have a shortwave radio-related shareware business. The server has spamassassin, but it is sometimes very ineffective in what it ultimately does with it. As a result I've had to modify their spamassassin script to perform a multi-level spam protection based on whitelisting known email addresses, then determining whether anything else should go to the junk box or directly to /dev/nul. I still want things going to the junk box in case it's something valid that I later need to add to the whitelist.
Been working on collecting spam samples since April developing this (~4600 samples to date), and can safely say that in the past 7 days, after nearly 400 spams, I've had zero (0) spams leak into my inbox or junk box. 400 is actually a moderate level - I was getting close to 900 during a spamstorm in the last week of July.
After saying all that, I can say that I've never received any spam in my hughes.net account, since I never use it as a username for anything other than my Hughes account(s). If you're going to use it as a honeypot, expect to get stung.
When the hack happened, I immediately wiped the drive (I actually wrote three passes of zeroes) and reinstalled Windows (I think I had 8.1 at the time), and I changed my password on another computer, as well as changing all of my passwords for the other sites I frequent, especially those that have personal info. I now use passwords at least 16 characters long (where allowed) and with no discernible pattern. I have to keep them all written down as there is NO way I could ever remember types of passwords I use, and it would take hackers quite some time, even with a great program, to decipher them. It was a hard lesson learned. And what's really frustrating is that I still know some people that use single word passwords, and when I tell them how important indecipherable passwords are, they do something ridiculous like adding a # sign to the end. Sure, adding a # sign makes it uncrackable. SMH. Derp!
I had occasional spam, but it wasn't until this incident that I started getting bombarded with it. And, unfortunately, even with blocking the domains it doesn't help much. I could spend a few hours each week blocking the domains, and the next week there would be just as many to block again. It's tedious, to say the least, and quite frustrating. Luckily, Outlook has a great spam filter, so that makes it so it's not quite on the level of wanting to pull my hair out. 😛
As for my Hughes email, I only use it for the forwarding of notifications from the HughesNet Community, and the first time I signed into my Hughes email was shortly before this new Community started. I actually still had my original HughesNet welcome email from 2004 in the inbox. It was sitting there, unread, for over 12 years. LOL.
The trick is not to block the domain of the email address, those are forged anyway. The trick is to block the domain of the IP that the email came from. I'm building a pseudo-mini-DNS to do this that comprises a regex of the full range of IPs for that domain, a username for the abuse address (bfore the "@"), and the domain itself (after the "@")...
Eventually I wanted this system to return the favor by auto-spamming their abuse address with a forward of each one I get. That kind of backfired, since there are truly foul email servers that collect received emails to... you can guess the rest.
That's how I knew Comcast was hacked to do that some time back. I was getting ten+ back for every one I sent. You can see how that escalates exponentially if I'm "returning the favor".
@MarkJFine wrote:The trick is not to block the domain of the email address, those are forged anyway. The trick is to block the domain of the IP that the email came from. I'm building a pseudo-mini-DNS to do this that comprises a regex of the full range of IPs for that domain, a username for the abuse address (bfore the "@"), and the domain itself (after the "@")...
I have no clue how to do any of that, so, for the interim, the best I can do is block the domain and hope for the best. Again, though, due to Outlook having a great spam filter, it doesn't really affect me any more than being an annoyance.
For all I know they do that, but I can tell you that 90% of the spam you get comes from only a handful of server domains.
All the spam is coming from <random>@<random>.nelottery.com
Since the parameter after the "@" appears to be randomly generated, I don't know how to shut it out. Outlook, indeed, is sweeping all of these to the Junk Folder, but boy, I would love to be able to get to Hughes so that THEIR master spam blocker would stop these in their tracks.
And, it is totally possible that nothing can do this. I am SOOOOO darned careful online, so I get really pissed when someone gets my email address and either spams me or spoofs me.
I'll have to see if I can find the IP addresses - but I don't know how to filter those, unfortunately.
*.nelottery.com? Sounds like one I haven't seen yet.
Chances are that someone that does have your email address got their address book lifted. The only way to ensure that doesn't happen is not to use email at all, and that kind of defeats the purpose of having it.
Only thing you can realistically do to stop it, and have some control over it, is the kind of system I'm currently setting up (why I'm doing it actually). This is after tons of research on the subject.
Only posting this in the hopes it helps get Hughes attention. There are two of us - we have Outlook and are Hughes satellite users (obviously). It is fairly recent but all of the spam comes in base 64 gibberish, with a "nelottery.com" type address. Most I block sender and delete. Did get one today that I could only delete because the address was disguised to prevent blocking.
@Deborah Hart Ye wrote:Only posting this in the hopes it helps get Hughes attention. There are two of us - we have Outlook and are Hughes satellite users (obviously). It is fairly recent but all of the spam comes in base 64 gibberish, with a "nelottery.com" type address. Most I block sender and delete. Did get one today that I could only delete because the address was disguised to prevent blocking.
Outlook as in Outlook for your email provider? The OPs issue is concerning Hughes' own email.
Outlook as in we have Hughes.net email addresses and we both happen to use Outlook as our email clients.
i just wonder why HughesNet's spam catcher isn't killing these emails from nelottery.com
Outlook's email client puts them in the spam folder, but I want HughesNet to kill them first!
And I wonder if the Nebraska Lottery (nelottery.com) knows it is being spoofed!
TuKatShak
Hello! A bit late but just wanted to give everyone the heads up that we're locking this thread. If you have concerns that need to be addressed please create a new post for yourself and explain in detail what the issue is so we can better assist you.
Thank you,
Amanda
Hughesnet has a spam blocker but if the companies that are sending out the spam has paid Hughesnet to allow thier spam to go through the blocker does no good as it has been set to allow that domain to come through and go to the customers.
It will not matter if you do change your email address, Hughesnet will still send that spam to your new email account any way.
Your accusations are complete and utter rubbish if not borderline libelous. I have a HughesNet account and get zero spam on it.
Chances are you signed up for something using your HughesNet address. What ever you signed up for sold your email to a bulk spam company. End of.
Secondly, it is considered appropriate to include the person you're responding to (as I have done) or use the Quote button when responding so what you write doesn't look like a random stream of non-sequitirs. I guarantee no one knows what you're talking about or to whom except you.
NO we do not need to sign up for these spammers that Hughesnet is making money from. Hughesnet is the ones that have given out our email addresses to these spammers and Hughesnet has knowingly and willfully allowed these spam emails to go to their customers and when you complain about it they only threaten you with cutting off your internet and also harass you to send them the spam emails which they can see in your email box which they had put there to begin with.
Me too. Within the past two weeks, I suddenly started getting several of these each day, from different userids and with domains all ending with .nelottery.com, for example,
2XF4Z@PJYRUGCFKJ.nelottery.com or RSWBV@DIAKN7TDC1.nelottery.com
Since 'nelottery.com' is not the full domain name, these clearly have nothing to do with the nelottery.com domain, but are probably intended to make one think so - enough to click to open the spam messages.
Though my Mac Mail program identifies these as possible spam, in brown, I'd rather not see them at all. I wish hughes could just block anything from domains ending in xxx.nelottery.com (where xxx is some non-null character string).
The *.nelottery.com part of the email address means nothing. Spammers often steal pseudo-valid but fake email addresses/domains in order for them to pass certain SpamAssassin tests.
What matters is the final IP address from where the HN email server received them, which indicate the open relay(s).
That's what you want to block, not the email address.