Subscribe
5 Ways Scammers Can Use Your Email Address Against You

5 Ways Scammers Can Use Your Email Address Against You

by Staff
0 comment

Scammers and cybercriminals are constantly searching for ways to compromise your security, hack into your accounts, and drain your hard-earned savings into their own coffers. You need to take every precaution to protect your personal information—both online, and in the digital world. This includes your email address, with which ne’er-do-wells can accomplish an awful lot.


So what can a cybercriminal do with just your email address?

Are Scammers Really After My Email Address?

Yes, they are. On August 16th 2022, cloud storage provider DigitalOcean was forced to disclose a data breach and contact all of its customers with the news that, “a number of DigitalOcean customer email addresses may have been viewed by an unauthorized individual.”

Email data breaches are a fairly common occurrence. Sometimes, physical addresses and passwords or hashes of passwords are leaked alongside the email address. Even if no other information is disclosed, a valid email address can provide multiple opportunities for scammers to take advantage of you. Here’s how…

1. Leaks Show Email Addresses Are in Use

There is a practically unlimited number of possible email addresses. If Gmail were the only email provider in the world, its 30 character username limit means that there are 30 ^ 36 or 30 undecillion possible combinations. Other providers have much higher limits, and the total number of email providers worldwide is unknown.

When scammers are looking for potential victims, sending out emails to random addresses isn’t going to cut it. Most potential email addresses are unused, have never been used, and will never be used. They can improve the odds a little by including common words, phrases, and numbers in their efforts.

Verifying that an email address is actively being used saves scammers a lot of effort and money (sending bulk emails is not always cheap), which is why email addresses databases are bought and sold openly online. If your email address is exposed, you can, at the very least, expect to receive a significant increase in junk mail, spam, and phishing attempts.

2. Your Email Can Make You a Target for Spear Phishing

Spear Phishing is a term for a phishing attempt when the scammer tailors a phishing email for a specific recipient. The more the scammer knows about the target, the more successful the attempt is likely to be.


The DigitalOcean breach disclosure came as part of an attempt by scammers to target cryptocurrency users, according to Mailchimp. This, by itself, gives phony email users an angle of attack for spear phishing, and an incentive to try.

Further information about the target can be gleaned from the email address itself. Many people use their full names and year of birth as part of their email address, allowing an attacker even more insight which can be used against the victim.

Lastly, if your email address—or part of your email address—is a username for social media accounts (if your username is “[email protected]” and your Twitter handle is “yeezydave1992”, for instance), they will be able to look over all aspects of your life, your relationships, hobbies, musical tastes, and then sculpt an email to trap you.

A little bit of research can reveal other people you may know: your mum, your boss, your clients. These are the people who might expect to receive an email from you and would not be unduly alarmed to find a message from your address in their inbox.

For example, one might say that you now consider the address “[email protected]” to be immature, and ask them to please contact you on the far more respectable “[email protected]”. Or perhaps they could email a client stating that your banking details have changed and further asking them to send the next payment to a different account.

Spoofing an email is astonishingly easy and can be accomplished in about five minutes with Telnet. In our experience, each email sent this way has about a 20 percent chance of making it through Gmail’s first level spam filters. The efficacy of other providers’ defenses will vary.


4. Your Email Address Is Half Your Login

To gain access to your many and varied online accounts, in many cases an attacker will only need two pieces of information: an email address and a password. If they already have your email address, that means the only thing they need to know is your password.

When creating an account online, there are certain minimum requirements for password strength. These may include a minimum length, the use of capital and lower case letters, numbers, and symbols.

But passwords are difficult to remember—especially when you need to remember different ones for different services. The most common password in use today is “123456”, with second place going to “123456789”, and there are lists of common passwords circulating on the web, let alone the dark web.

All an attacker needs to do is match a common password with an already known email address. While we’re not suggesting that your own password is weak, it may be worthwhile choosing a new, strong password to protect your account.

5. An Attacker Can Fake Your Email Address With Unicode

Spoofing an email address to fool acquaintances of the target is quick and easy to do, but has a low success rate, and emails replies will be seen by the person being impersonated. It is far better (from a criminal point of view) to create an email address which seems identical, but which is invisibly different. Not just subtly different but invisibly.

Consider the following two characters: “а” and “a”. Do they look different to you? One is the Cyrillic character, “а”, which is completely different to the Latin character, “a”.

Unicode spoofing allows attackers—or other interested parties—to create a domain name which looks identical to a legitimate domain. Receiving an email from “[email protected]” is completely different to one from “[email protected]аkeuseof.com”. Other easily spoofed characters include к, о, р, с, у, х.

An attacker who purchases that domain name will be able to send emails which appear to be from a legitimate source, and for which they can receive replies and correspond as if they were really a makeuseof.com staffer.

You shouldn’t feel safe just because your email address is with a major provider, either. While some of the more obviously spoofable domains are no longer available, there are plenty of alternative top level domains for sale.

Yes, your email can be spoofed to successfully fool people, and it will cost an attacker less than $10.


Keep Your Email Address Hidden

You can’t avoid giving out your email completely—it’s there to be used, after all. But you should take care of your main email address, i.e. the one you use in conjunction with your bank and PayPal accounts is different from the ones you use for sign-ups and digital services.

Ideally, you should have a different email address to give out to every person or organization you have contact with. This will limit the damage if your email address is ever disclosed. If you don’t have time for that, consider using aliases.

Read the full article here

SaleBestseller No. 1
Apple AirPods Max Wireless Over-Ear Headphones. Active Noise Cancelling, Transparency Mode, Spatial Audio, Digital Crown for Volume Control. Bluetooth Headphones for iPhone - Green
Apple AirPods Max Wireless Over-Ear Headphones. Active Noise Cancelling, Transparency Mode, Spatial Audio, Digital Crown for Volume Control. Bluetooth Headphones for iPhone - Green
 Apple-designed dynamic driver provides high-fidelity audio; Active Noise Cancellation blocks outside noise, so you can immerse yourself in music
$449.99
SaleBestseller No. 3
Apple iPad Air 2, 64 GB, Space Gray (Renewed)
Apple iPad Air 2, 64 GB, Space Gray (Renewed)
Apple iOS 8; 9.7-Inch Retina Display; 2048x1536 Resolution; A8X Chip with 64-bit Architecture; M8 Motion Coprocessor
$129.99
SaleBestseller No. 4
2021 Apple 10.2-inch iPad (Wi-Fi, 64GB) - Silver
2021 Apple 10.2-inch iPad (Wi-Fi, 64GB) - Silver
Gorgeous 10.2-inch Retina display with True Tone; A13 Bionic chip with Neural Engine; 8MP Wide back camera, 12MP Ultra Wide front camera with Center Stage
$269.99
Bestseller No. 5
2022 Apple TV 4K Wi‑Fi with 64GB Storage (3rd Generation)
2022 Apple TV 4K Wi‑Fi with 64GB Storage (3rd Generation)
4K Dolby Vision and HDR10+ for vivid picture quality; Dolby Atmos for three-dimensional, theater-like sound
$123.49
Bestseller No. 7
Apple AirTag 4 Pack
Apple AirTag 4 Pack
Keep track of and find your items alongside friends and devices in the Find My app; Simple one-tap setup instantly connects AirTag with your iPhone or iPad
Bestseller No. 8
Apple MacBook Air with Intel Core i5, 1.6GHz, (13-inch, 4GB,128GB SSD) - Silver (Renewed)
Apple MacBook Air with Intel Core i5, 1.6GHz, (13-inch, 4GB,128GB SSD) - Silver (Renewed)
1.6 GHz dual-core Intel Core i5 (Turbo Boost up to 2.7 GHz) with 3 MB shared L3 cache; 13.3-Inch (diagonal) LED-backlit Glossy Widescreen Display, 1440 x 900 resolution
$305.00
Bestseller No. 9
Apple Of My Eye
Apple Of My Eye
Amazon Prime Video (Video on Demand); Amy Smart, Burt Reynolds, Liam McIntyre (Actors); Castille Landon (Director) - Castille Landon (Writer) - Dori A. Rath (Producer)
$3.99
SaleBestseller No. 10
Apple 35W Dual USB-C Port Compact Power Adapter ​​​​​​​
Apple 35W Dual USB-C Port Compact Power Adapter ​​​​​​​
The compact size and folding prongs make it easy to pack and store.; Charging cable sold separately.
$52.00

You may also like

Leave a Comment

Iman Hearts is one of the biggest lifestyle news and articles portals, we provide the latest news and articles about family, lifestyle, entertainment, and many more, follow us to get the latest news about what matters to you.

 

© 2022 Iman Hearts. All rights reserved. Sitemap