|
|
|
sleemanj:networkn: Also each account is sending to all it's address book entries etc as well, which also couldn't happen via phishing.
While I'm not convinced that this is only the XSS phishing attack in play at all, it's not entirely correct to say that a phisher can't get your address book entries.
I believe that the webmail by Yahoo/Xtra collects address book entries automatically, but in any case, the Yahoo XSS phishing hack from last month allows the attacker access to your webmail (by stealing your cookies) including the addressbook therein.
So yes, if this were the XSS phishing attack in use, they can (and would) send to your address book.
Tokes: This whole situation seems odd - one of these emails was sent from an old address of mine and I received it as my current address is in the address book (I haven't used this address for over a year - and have never used the account for anything other than sending a couple of emails).
Telecom should really take a front foot approach and contact all users to get them to change their passwords (as opposed to being reactive).
networkn:Tokes: This whole situation seems odd - one of these emails was sent from an old address of mine and I received it as my current address is in the address book (I haven't used this address for over a year - and have never used the account for anything other than sending a couple of emails).
Telecom should really take a front foot approach and contact all users to get them to change their passwords (as opposed to being reactive).
LOL any idea how long that would take ? They are the largest ISP in NZ!
mattwnz:networkn:Tokes: This whole situation seems odd - one of these emails was sent from an old address of mine and I received it as my current address is in the address book (I haven't used this address for over a year - and have never used the account for anything other than sending a couple of emails).
Telecom should really take a front foot approach and contact all users to get them to change their passwords (as opposed to being reactive).
LOL any idea how long that would take ? They are the largest ISP in NZ!
An hour to write the email and send to their client database. They should force a password change when signing into Web mail.
mattwnz: An hour to write the email and send to their client database. They should force a password change when signing into Web mail.
Referral links: Quic Broadband (free setup code: R587125ERQ6VE) | Samsung | AliExpress | Wise | Sharesies
Support Geekzone by subscribing (browse ads-free), or making a one-off or recurring donation through PressPatron.
freitasm:mattwnz: An hour to write the email and send to their client database. They should force a password change when signing into Web mail.
And those who never access the webmail would have no idea why their POP access stopped working, and there'd be a wave of calls to the help desk.
No, there must be another way.
Referral links: Quic Broadband (free setup code: R587125ERQ6VE) | Samsung | AliExpress | Wise | Sharesies
Support Geekzone by subscribing (browse ads-free), or making a one-off or recurring donation through PressPatron.
freitasm: Which means people would still be vulnerable...
mattwnz:freitasm:mattwnz: An hour to write the email and send to their client database. They should force a password change when signing into Web mail.
And those who never access the webmail would have no idea why their POP access stopped working, and there'd be a wave of calls to the help desk.
No, there must be another way.
You can force a password change in some systems by allowing people to log in using their old password, and then they are forced to change that password after they login, before they can access their email. SOme online banks do this, so people regularly change their banking password. Therefore it shouldn't affect pop access until the person has logged into webmail and changed the password.
IT Guy, ex-FIFA Referee, Dad
drquack32:mattwnz:freitasm:mattwnz: An hour to write the email and send to their client database. They should force a password change when signing into Web mail.
And those who never access the webmail would have no idea why their POP access stopped working, and there'd be a wave of calls to the help desk.
No, there must be another way.
You can force a password change in some systems by allowing people to log in using their old password, and then they are forced to change that password after they login, before they can access their email. SOme online banks do this, so people regularly change their banking password. Therefore it shouldn't affect pop access until the person has logged into webmail and changed the password.
I can give you the example that I pretty much have not used my Xtra account in over a year. I just have it on iOS as a mail account. Tell me in your scenario above, how that gets sorted?
|
|
|