<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
 xmlns:blogChannel="http://backend.userland.com/blogChannelModule"
>

<channel>
<title>Topic &#x27;Re: [Southeast] ATT Security Breach..&#x27; in forum &#x27;AT&#x26;T DSL&#x27; - dslreports.com</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285221</link>
<description></description>
<language>en</language>
<pubDate>Sat, 26 Mar 2022 14:04:44 EDT</pubDate>
<lastBuildDate>Sat, 26 Mar 2022 14:04:44 EDT</lastBuildDate>

<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28309323</link>
<description><![CDATA[hotlynx2 posted : My ATT/ Yahoo account was hacked last year (10/2012) (never had Yahoo Voices).I had a simple password but I think they got into Yahoo's database.Never replied to any Phishing email.Caught it quick and went to ATT web site and changed to a complex password and got it stopped. they were sending spam to all my contacts.<br><small>--<br>Motorola 3360,Trendnet TEW-432BRP ROUTER, GA-P43T-ES3G E8400,4GB ram,HD4650 VID,PowerEdge SC430,ECS N2U400-A,AMD XP3200+,1GB ddr memory, Radeon 9800XT AGP</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28309323</guid>
<pubDate>Tue, 21 May 2013 13:27:04 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28298357</link>
<description><![CDATA[NormanS posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>Norman thanks i will Check that blue area you highlighted and will edit in this post if anything thing is different.<br><br>NO i dont think ( fed1rmimpi312) is a real Cox email address.  :D but if you Google its listed as a scammer... I know some about headers <br> </p></div>Fair enough; but in the context of your headers it is just part an FQDN (Fully Qualified Domain Name); a host name used by Cox on one of their servers. If, instead of Google, you use 'nslookup' from a command line, you will find an IP address. If you run WHOIS on the IP address (I use a Windows port of a Linux tool), you will find that both the domain part of the FQDN ('cox.net') and the IP address belong to Cox.<br><div class="bquote"><p>This is the Email that was sent to her am Redacting her email only ...<br> </p></div>While the link looks legitimate, the "Cc:" list including non-AT&T domains is suspicious.<br><div class="bquote"><p>EDIT Redacted her name..<br><pre class="brush: text">X-Rocket-Received: from potemynu (*******@109.165.194.75 with plain)&#012;        by smtp148.mail.ird.yahoo.com with SMTP; 12 May 2013 16:16:43&#012; &#012;</pre><!--end code block--><br> The ip comes from <br><pre class="brush: text"> IP Lookup Result for 109.165.194.75&#012;IP Address:109.165.194.75&#012;Host of this IP:adsl-165-194-75.teol.net&#012;Organization:Telekom Srpske&#012;ISP:Telekom Srpske&#012;City:Srpska&#012;Country:Bosnia and Herzegovina&#012;State:Republika Srpska&#012;Timezone:Europe/Sarajevo&#012; &#012;</pre><!--end code block--> </p></div>I have never received an email from AT&T regarding a security issue. The most recent AT&T communication that I have received does not include this line, which stamped by the Yahoo! message submission server. It also does not have a "Cc:" list of recipients; AT&T users, or otherwise.<br><br>I presume the string of asterisk's is your sister's Bellsouth email account user name. That would pretty much clinch a hack.<br><br>Was there an attachment? Was the link embedded in the email encoded? Either would be further suspicious sign<br><div class="bquote"><p>Thanks Norman you were alot of help...<br> </p></div>You're welcome. Until I had seen the Yahoo! Voices breach, I was doubtful about how a Yahoo! account could be hacked; other than by responding to a "phish". But whatever other posters might say, unless they can tear my proposition apart in a logical manner, your sister's account was, indeed, hacked.<br><br>WRT to the poster claiming forgery, I know it is more common. But Knowing what to look for in the headers will sort that out.<br><br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28298357</guid>
<pubDate>Fri, 17 May 2013 00:14:06 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297985</link>
<description><![CDATA[08034016 posted : Norman thanks i will Check that blue area you highlighted and will edit in this post if anything thing is different.<br><br>NO i dont think ( fed1rmimpi312) is a real Cox email address.  :D but if you Google its listed as a scammer... I know some about headers <br>This is the Email that was sent to her am Redacting her email only..<br><br>           <BLOCKQUOTE><SMALL>quote:</SMALL><HR>From: AT&T Internet Security Services Center <please_do_not_reply@att.net><br>To: *********@bellsouth.net <br>Sent: Monday, May 13, 2013 3:44 AM<br>Subject: WARNING NOTICE from the AT&T Internet Services Security Center<br><br>This email is to advise you that your account may have been compromised.  We recommend changing the passwords on your account(s).  In case of active misuse the account will have the password invalidated.  Be sure to select a password not used previously. <br><br>Please review the help information posted online for additional information and steps to take.  &raquo;<A HREF="http://www.att.com/HackedID" >www.att.com/HackedID</A> <br><br>If you are unable to regain access to your account with the online support you may contact customer service at 800 ATT-2020 (800 288-2020) and speak with Technical Support.<br><br>Regards,<br>AT&T Internet Services Security Center<br>abuse@att.net<HR></BLOCKQUOTE><br><br>EDIT Redacted her name..<br><pre class="brush: text">X-Rocket-Received: from potemynu (*******@109.165.194.75 with plain)&#012;        by smtp148.mail.ird.yahoo.com with SMTP; 12 May 2013 16:16:43&#012; &#012;</pre><!--end code block--><br> The ip comes from <br><pre class="brush: text"> IP Lookup Result for 109.165.194.75&#012;IP Address:109.165.194.75&#012;Host of this IP:adsl-165-194-75.teol.net&#012;Organization:Telekom Srpske&#012;ISP:Telekom Srpske&#012;City:Srpska&#012;Country:Bosnia and Herzegovina&#012;State:Republika Srpska&#012;Timezone:Europe/Sarajevo&#012; &#012;</pre><!--end code block--><br>Thanks Norman you were alot of help...<br><small>--<br>Holocaust survivors and their family's fill this out.<br>&raquo;<A HREF="http://online.ushmm.org/registry/update_info/main_form.php" >online.ushmm.org/registr &middot;&middot;&middot; form.php</A><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297985</guid>
<pubDate>Thu, 16 May 2013 21:44:20 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297968</link>
<description><![CDATA[NormanS posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>The Person who is from New Orleans is fed1rmfepi106.cox.net, i gave this email to Cox.net it doesnt exist ,that persons email is also  eastrmfepo202.cox.net, hes listed as a scammer... <br> </p></div>????<br><br>Did you really think 'fed1rmfepi106.cox.net' is an email address?<br><br><pre class="brush: text">C:\util\dig&gt;nslookup fed1rmfepi106.cox.net&#012;Server:  ordns.he.net&#012;Address:  2001:470:20::2&#012; &#012;Non-authoritative answer:&#012;Name:    fed1rmfepi106.cox.net&#012;Address:  68.230.241.137&#012; &#012;</pre><!--end code block--><br>This 'fed1rmfepi106.cox.net' is a Cox <B>Mail Server</B>!!!!!!!<br><br>Look, I am biting my tongue until it bleeds to avoid an offensive .gif smiley; but you seriously need to learn how to read email trace headers.<br><br>This line was stamped by <B>your</B> Cox mail server:<br><pre class="brush: text">Received: from fed1rmimpi312 (&#91;68.230.241.31&#93;) by fed1rmfepi106.cox.net&#012;          (InterMail vM.8.01.05.09 201-2260-151-124-20120717) with ESMTP&#012;          id &lt;20130512231646.NDJR23600.fed1rmfepi106.cox.net@fed1rmimpi312&gt;&#012;          for ******cox.net&gt;; Sun, 12 May 2013 19:16:46 -0400&#012; &#012;</pre><!--end code block-->Here is what is happening:<br><br>Cox mail server, 'fed1rmimpi312 ([68.230.241.31])', is forwarding email to Cox MDA, 'fed1rmfepi106.cox.net', (Mail Delivery Agent) so some Cox user (&#60;*****cox.net&#62;) can pick it up with his favorite email client. This is an <B>Internal</B> handoff.<br><br>This line was also stamped by your Cox mail server:<br><pre class="brush: text">Received: from nm25-vm5.bullet.mail.ird.yahoo.com (&#91;212.82.109.206&#93;)&#012;          by fed1rmimpi312 with cox id bCGj1l0074TDflQ01CGkMq;&#012;          Sun, 12 May 2013 19:16:45 -0500&#012; &#012;</pre><!--end code block--><br>Yahoo! MTA (Mail Transfer Agent), 'nm25-vm5.bullet.mail.ird.yahoo.com ([212.82.109.206])', connected with Cox MX (Mail eXchanger), 'fed1rmimpi312', to deliver email from a Yahoo! user; which would include any user of at least a half dozen ISPs (including AT&T) which outsource user email to Yahoo!.<br><br>Now the Cox mail servers could damned well be in Louisiana, but they are <B>not</B> Cox user IDs.<br><br>OTOH, the Yahoo! MTA IP address is from a block of IP addresses assigned to Yahoo! Europe by RIPE, one of five RIRs (Regional Internet Registry) which assign IP addresses.<br><br>For the record, they are:<br><br>&#8226; AfriNIC (Africa.)<br>&#8226; APNIC (Asia-Pacific.)<br>&#8226; ARIN (North America.)<br>&#8226; LACNIC (Latin America.)<br>&#8226; RIPE (Europe and the Middle East.)<br><br>Now, please! Pay attention. As FBI agents Scully and Mulder know, "The Truth is out there." But you need to know where to look!<br><br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297968</guid>
<pubDate>Thu, 16 May 2013 21:39:27 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297834</link>
<description><![CDATA[NormanS posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>Norman there was nothing redacted, the only thing was my e-mail and hers. that's it. No other thing was like ,,,,///%<br>What you see it pure besides the email.<br> </p></div>I believe programmers use %Named_Variable% to indicate a place where variable data will actually be used in the execution of the code; I was just trying to set off what will be variable data in the line in question. So allow me to show yours and mine side-by-side:<br><pre class="brush: text">X-Rocket-Received: from akari (********@173.228.7.217 with login)                    | X-Rocket-Received: from potemynu &#91;&#93; (&#91;&#93; with plain)&#012;        by smtp102.sbc.mail.gq1.yahoo.com with SMTP; 15 May 2013 19:02:30 -0700 PDT  |         by smtp148.mail.ird.yahoo.com with SMTP; 12 May 2013 16:16:43 -0700 PDT&#012; &#012;</pre><!--end code block--><br>Can you see what is missing from your posted headers which is present in mine? I put square brackets in yours, where there is missing data.<br><br><B>This single line explicitly displays the account user name, and the IP address of the connection where the Message Submission occurred. If those voids in your post truly exist, then either that line is forged, or this email was created by a Yahoo! employee with access to core systems!</B><br><br>Neither of which is a, "hack" of the username+password data base.<br><div class="bquote"><p>Norman look at the last e-mail  see it<br><br><pre class="brush: text">&lt;customerservice@gtxpress.com&gt;, &lt;sarah.lee@davita.com&gt;, @bellsouth.net&gt;, &lt;fcheney@bellsouth.net&gt;, &lt;lisa_ales@baxter.com&gt;, &lt;alan.little@genzyme.com&gt;, &lt;fdcheney@dhr.state.ga.us&gt;&#012;Subject: Fw: &#012; &#012;</pre><!--end code block--><br>The last email went to to state of Georgia state.ga.us<br><br> that e-mail went to the GEORGIA DEPARTMENT OF HUMAN RESOURCES.<br><br> </p></div>That line indicates a Cc: list of recipients; it went to seven disparate persons, only one of whom was a State of Georgia employee.<br><br>Please, if you intend to use e-mail trace headers for forensic evidence, learn which lines are of significance to the investigation, and which are irrelevant.<br><br>For grins and giggles, I took a screen shot of our respective headers. I removed some ISP-specific lines, pertaining to spam checking (Cox and Sonic.net, LLC have different header tags), and rearranged others to align together.<br>[att=1]<br>The red box at the top shows the active AT&T email domains in play. The red box above the "To:" lines shows the account authentication data that the Yahoo! servers stamp in their headers. The blue boxes in your headers mark the voids which <B>would</B> contain the evidence needed to prove either a hack (your sister's Bellsouth user name), or a forgery (some random Yahoo! user name).<br><br>If you can't show the missing data (it would be fair to substitute, "Sister'sBSName" in place of her actual user name; and merely state that the IP address was her Bellsouth issue public IP address, if that was the case), then stop trying to prove your claim that AT&T was "hacked". I already know, since last year, that Yahoo! Voices was hacked, revealing between 430,000 and 450,000 user names and associated passwords. I have seen plenty of news articles about how a AT&T 3G iPad user data base was hacked. But you need to show what happened to your sister. I have already detailed how you can prove a hack; but until you are forthcoming with the voided data in the "X-Rocket-Received:" header line, you can't prove squat.<br><br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small><!-- 28297834  HASH(0xaa9bf28)   --><div class="borderless"><TABLE WIDTH=96% align=center border=0 CELLPADDING=4"><TR><TD ALIGN=CENTER VALIGN=MIDDLE COLSPAN=3 WIDTH=100%><A HREF="/speak/slideshow/28297834?c=2097409&ret=64urlL2ZvcnVtL3IyODI4NzgwMS54bWw"><IMG class="apic" id="p15963" BORDER=0 TITLE="108994 bytes" SRC="/r0/download/2097409.thumb600~ec07065e8174fe3ea14c95990276d98b/Sec_Breach.png/thumb.jpg" ALT="Click for full size"></A><br>Side by side header comparison.</TD></TABLE></div>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297834</guid>
<pubDate>Thu, 16 May 2013 20:51:01 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297369</link>
<description><![CDATA[08034016 posted : <div class="bquote"><said>said by <a href="/profile/314530" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=314530');">NormanS</a>:</said><p>But the Received line IP addresses above suggest a European origin, which is a long way from Louisiana.<br> </p></div>The Person who is from New Orleans is fed1rmfepi106.cox.net, i gave this email to Cox.net it doesnt exist ,that persons email is also  eastrmfepo202.cox.net, hes listed as a scammer... <br><br>Tbusiness please go back and read where i stated ATT told me they were Hacked. when my sister has the time she will e-mail a copy of the hack notification.<br><br>Norman there was nothing redacted, the only thing was my e-mail and hers. that's it. No other thing was like ,,,,///%<br>What you see it pure besides the email.<br><br>Norman look at the last e-mail  see it<br><br><pre class="brush: text">&lt;customerservice@gtxpress.com&gt;, &lt;sarah.lee@davita.com&gt;, @bellsouth.net&gt;, &lt;fcheney@bellsouth.net&gt;, &lt;lisa_ales@baxter.com&gt;, &lt;alan.little@genzyme.com&gt;, &lt;fdcheney@dhr.state.ga.us&gt;&#012;Subject: Fw: &#012; &#012;</pre><!--end code block--><br>The last email went to to state of Georgia state.ga.us<br><br> that e-mail went to the GEORGIA DEPARTMENT OF HUMAN RESOURCES.<br><br><small>--<br>Holocaust survivors and their family's fill this out.<br>&raquo;<A HREF="http://online.ushmm.org/registry/update_info/main_form.php" >online.ushmm.org/registr &middot;&middot;&middot; form.php</A><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297369</guid>
<pubDate>Thu, 16 May 2013 17:45:41 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297272</link>
<description><![CDATA[NormanS posted : Let's play a game! Tell me what these headers tell you?<br><pre class="brush: text">Return-Path: &lt;********@pacbell.net&gt;&#012;X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on b.spam.sonic.net&#012;X-Spam-Level: &#012;X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,&#012;DKIM_VALID_AU,RCVD_IN_DNSWL_NONE autolearn=disabled version=3.3.2&#012;Received: from h.mx.sonic.net (h.mx.sonic.net &#91;69.12.208.76&#93;)&#012;by a.spam.sonic.net (8.14.4/8.14.4) with ESMTP id r4G22ZgL009889&#012;for &lt;********@lds.sonic.net&gt;; Wed, 15 May 2013 19:02:35 -0700&#012;Received: from nm8-vm0.access.bullet.mail.sp2.yahoo.com (nm8-vm0.access.bullet.mail.sp2.yahoo.com &#91;98.139.44.118&#93;)&#012;by h.mx.sonic.net (8.13.8.Beta0-Sonic/8.13.7) with ESMTP id r4G22Vwg000902&#012;for &lt;********@sonic.net&gt;; Wed, 15 May 2013 19:02:35 -0700&#012;Received: from &#91;98.139.44.105&#93; by nm8.access.bullet.mail.sp2.yahoo.com with NNFMP; 16 May 2013 02:02:31 -0000&#012;Received: from &#91;67.195.15.61&#93; by tm10.access.bullet.mail.sp2.yahoo.com with NNFMP; 16 May 2013 02:02:31 -0000&#012;Received: from &#91;127.0.0.1&#93; by smtp102.sbc.mail.gq1.yahoo.com with NNFMP; 16 May 2013 02:02:31 -0000&#012;DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pacbell.net; s=s1024; t=1368669751; bh=knDQSrdfwaO+6dBTdEmIgRDZ7r7eegF3SoICUVUav0M=; h=X-Yahoo-Newman-Id:X-Yahoo-Newman-Property:X-YMail-OSG:X-Yahoo-SMTP:X-Rocket-Received:Content-Type:Date:To:Subject:MIME-Version:Content-Transfer-Encoding:From:Organization:Message-ID:User-Agent; b=3tcsO5W8QmhIkmrn9F/ROoDip7Ug6+23sZvlOTgIhqEpHXrbTKImCGlaN5COEhPjNAdvG7mQObA3zcYGiBNgCKPUb13xOjjA2QVpSHrB5pug8N9d d9CZ89s8n+ac93FuetDTwugUtt4kDoRMMG3C4E72WTnFa1uiR6poaBfBxDc=&#012;X-Yahoo-Newman-Id: 40225.3363.bm@smtp102.sbc.mail.gq1.yahoo.com&#012;X-Yahoo-Newman-Property: ymail-3&#012;X-YMail-OSG: MNnM_YcVM1mEj.hgye.JH4NgRTWP91yM8hw5bqfuHEyL7QR&#012; 3rSjaSjGBW3ZCf5K_dTzAqcTKJ_SjN_U1cP3aWo5uBi84.6Xlb.c0a.PseR0&#012; hwlR8L.DkmiVgrTJt7eXxUZYje6GVc6gQ5yzfVsYpdi58N.71CJCcF3fcMdQ&#012; xnaZSgT5G.a8kVJrPGJqoRqHeYIdxTRbSujZpRhjfBaVv1GFngSXjUcxJTqg&#012; I10fKxhkXH1YnPUxnQFLTJ5aYlS2LEiWZgv7KjV_92xlUuBjxZGJd2gK1iT5&#012; y8wkKLleopZ1AiArBHoeNzUOFrAKL19OsEmmUiGtzv1.WgEeN8ddGbdOdZSf&#012; nwtaB0L5MmPyJC.ai5RtL4RVKKOLTc1oLoSkuZPohG9EJAtqtzTJ3kjgTpEb&#012; wNXe0gi6tscEqsS4A_2lZEASE7lTOV5wAJf6pneJdgQg9vHnMkipSFgfdE8h&#012; HU3owaMvuuyr64wcY_yfkEfr6juScu4b3iBKBUfl7kpP9QXJsDbcYyWV0g8P&#012; vH6QgqJ5ab.vE3Lm8WklzlhMPIVui&#012;X-Yahoo-SMTP: uXAXO6.swBA87Q6YS6Xron6jHSJejW560YSfkpG5jA--&#012;X-Rocket-Received: from akari.aosake.net (********@173.228.7.217 with login)&#012;        by smtp102.sbc.mail.gq1.yahoo.com with SMTP; 15 May 2013 19:02:30 -0700 PDT&#012;Content-Type: text/plain; charset=iso-8859-15; format=flowed; delsp=yes&#012;Date: Wed, 15 May 2013 19:02:28 -0700&#012;To: ********@sonic.net&#012;Subject: &#91;POC&#93; Using official AT&amp;T servers?&#012;MIME-Version: 1.0&#012;Content-Transfer-Encoding: 7bit&#012;From: "NormanS" &lt;********@pacbell.net&gt;&#012;Organization: PDR&#012;Message-ID: &lt;op.ww5mmef0ipr21d@akari.aosake.net&gt;&#012;User-Agent: Opera Mail/12.15 (Win64)&#012;X-Sonic-SB-IP-RBLs: IP RBLs sorbs-spam.&#012; &#012;</pre><!--end code block--><br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28297272</guid>
<pubDate>Thu, 16 May 2013 17:12:23 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28296841</link>
<description><![CDATA[medbuyer posted : that's what you and your sister get when you FWD all those junk emails...]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28296841</guid>
<pubDate>Thu, 16 May 2013 14:54:01 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28295885</link>
<description><![CDATA[NormanS posted : This line from his headers:<br><pre class="brush: text">X-Rocket-Received: from potemynu (with plain)&#012;        by smtp148.mail.ird.yahoo.com with SMTP; 12 May 2013 16:16:43 -0700 PDT&#012; &#012;</pre><!--end code block--><br>Could be evidence of a hack, <B>if</B> the information were not redacted.<br><br>If the missing information were thus:<br><pre class="brush: text">X-Rocket-Received: from potemynu (%Bellsouth_User_name%@%RIPE_IP_Address%  with plain)&#012;        by smtp148.mail.ird.yahoo.com with SMTP; 12 May 2013 16:16:43 -0700 PDT&#012; &#012;</pre><!--end code block--><br>... how could that not be a hack? Since the OP conveniently redacted that data, we can't know.<br><br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28295885</guid>
<pubDate>Thu, 16 May 2013 09:58:29 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28295774</link>
<description><![CDATA[TBBroadband posted : These are NOT hacks. These are addresses that are being "spoofed" It's common and happens all the time.   Maybe your sister should move away from the ISP email if she has concerns about it.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28295774</guid>
<pubDate>Thu, 16 May 2013 09:27:26 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28294732</link>
<description><![CDATA[NormanS posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>First this security Breach that happen when i posted this was about their DSL service not 3G ...<br> </p></div>Irrelevant. Different systems.<br><div class="bquote"><p>Google ATT HACKED all last year and this year....<br> </p></div>All that I can find for this year are references to your irrelevant iPad hack; nothing DSL related. In fact, AT&T changed their login to separate the "network login" from the "e-mail login". The DSL login can, and should be different from the e-mail login.<br><br>I did find these for 2012:<br><br>&raquo;<A HREF="http://nakedsecurity.sophos.com/2012/07/12/yahoo-voices-hacked/" >nakedsecurity.sophos.com &middot;&middot;&middot; -hacked/</A><br>&raquo;<A HREF="http://news.yahoo.com/yahoo-voice-hacked-usernames-passwords-posted-online-013617215.html" >news.yahoo.com/yahoo-voi &middot;&middot;&middot; 215.html</A><br>&raquo;<A HREF="http://dazzlepod.com/yahoo/" >dazzlepod.com/yahoo/</A><br><br>This breach affected a large number of customers; and not just AT&T.<br><br>Allow me to focus on the most critical line of your headers:<br><div class="bquote"><p>X-Rocket-Received: from potemynu ( with plain)<br>        by smtp148.mail.ird.yahoo.com with SMTP; 12 May 2013 16:16:43 -0700 PDT<br>[/code]<br> </p></div>Totally devoid of any useful information. Compare:<br>[code]<br>X-Rocket-Received: from %Local_Machine_IP_Address% (%ATT_User%@173.228.7.217 with plain)<br>        by smtp103.sbc.mail.gq1.yahoo.com with SMTP; 13 May 2013 23:55:44 -0700 PDT<br>[/code]<br>The items between the % signs aren't important; but the missing IP address is an important clue.<br><br>But the Received line IP addresses above suggest a European origin, which is a long way from Louisiana.<br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28294732</guid>
<pubDate>Wed, 15 May 2013 21:05:49 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28294064</link>
<description><![CDATA[08034016 posted : <div class="bquote"><said>said by <a href="/profile/314530" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=314530');">NormanS</a>:</said><p><div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>i know one of the scammers e-mail its out of New Orleans.<br><br>6 months later nothing changed on ATT'S SIDE...<br><br>&raquo;<A HREF="http://www.fbi.gov/newark/press-releases/2013/new-york-man-sentenced-to-41-months-in-prison-for-hacking-at-ts-servers" >www.fbi.gov/newark/press &middot;&middot;&middot; -servers</A><br> </p></div>Okay. A breach of the 3G network, and the compromised email addresses were likely not all '@att.net'.<br><br> </p></div>First this security Breach that happen when i posted this was about their DSL service not 3G, i just put that in here  to show that ATT doesn't know how to secure their system Period .<br><br>Google ATT HACKED all last year and this year....<br><br><pre class="brush: text">Return-Path: ******@bellsouth.net&gt;&#012;Received: from fed1rmimpi312 (&#91;68.230.241.31&#93;) by fed1rmfepi106.cox.net&#012;          (InterMail vM.8.01.05.09 201-2260-151-124-20120717) with ESMTP&#012;          id &lt;20130512231646.NDJR23600.fed1rmfepi106.cox.net@fed1rmimpi312&gt;&#012;          for ******cox.net&gt;; Sun, 12 May 2013 19:16:46 -0400&#012;Received: from nm25-vm5.bullet.mail.ird.yahoo.com (&#91;212.82.109.206&#93;)&#012;by fed1rmimpi312 with cox&#012;id bCGj1l0074TDflQ01CGkMq; Sun, 12 May 2013 19:16:45 -0500&#012;X-CT-Class: Clean&#012;X-CT-Score: 0.00&#012;X-CT-RefID: str=0001.0A020204.519022DE.0065,ss=1,re=0.000,fgs=0&#012;X-CT-Spam: 0&#012;X-Authority-Analysis: v=2.0 cv=ae6/a2Ut c=1 sm=1 a=DvSzqBOGy98A:10&#012; a=pedpZTtsAAAA:8 a=CjxXgO3LAAAA:8 a=AAM1xwptAAAA:8 a=Xd0hfm-_JGTuFHbRoFQA:9&#012; a=4MuJgtpZMHIA:10 a=olONZrSvYMfqxlEMkTnPuA==:117&#012;X-CM-Score: 0.00&#012;Received: from &#91;77.238.189.233&#93; by nm25.bullet.mail.ird.yahoo.com with NNFMP; 12 May 2013 23:16:44 -0000&#012;Received: from &#91;217.146.189.68&#93; by tm14.bullet.mail.ird.yahoo.com with NNFMP; 12 May 2013 23:16:44 -0000&#012;Received: from &#91;127.0.0.1&#93; by smtp148.mail.ird.yahoo.com with NNFMP; 12 May 2013 23:16:44 -0000&#012;DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bellsouth.net; s=s1024; t=1368400604; bh=jIHcJqCcv7nyvDH/8xkK/n5Q3NLszLe7yOJBgibmOpY=; h=X-Yahoo-Newman-Id:Message-ID:Date:X-Rocket-Received:X-Yahoo-Newman-Property:X-YMail-OSG:X-Yahoo-SMTP:From:To:Subject; b=lNST70Z7m2EIGySbQAIlOOo9o8OSCU0Fj2aSQ2yUCi4Z5uZdjkq9ONL7SaLhb3y3SJwxdWxEgkd1yj3s RSgpZsqyJnjqA+jYgU084bl6GGpTXglKXc2GiMn1u7HY/+nTdc7qf83hYkG4HJlYm/T4+W6ryzF6DhTkzLQdVUB34ZA=&#012;X-Yahoo-Newman-Id: 74972.91002.bm@smtp148.mail.ird.yahoo.com&#012;Message-ID: &lt;74972.91002.bm@smtp148.mail.ird.yahoo.com&gt;&#012;Date: Sun, 12 May 2013 16:16:44 -0700 (PDT)&#012;X-Rocket-Received: from potemynu ( with plain)&#012;        by smtp148.mail.ird.yahoo.com with SMTP; 12 May 2013 16:16:43 -0700 PDT&#012;X-Yahoo-Newman-Property: ymail-3&#012;X-YMail-OSG: IomzeVUVM1lZckcFMNk4pjEHpQSoRJ2AWvC12yB.uOS1Oh_&#012; Yo0KXmSyrSq1zvIKrf3HNN8HhoscpKQ6Cy6l3hqoI2eRm2FZDu7PlcY6lk57&#012; kEOIW9SjcC3a4aHPpqTBZew705unj.uUXMPOwsqySuqC.RNL6oqObBQ1Ek0r&#012; F1XV_WrXjryJy0gG6gXsRtiMq4ihiYSwy2cdteao0UplBw5J4f8MqceUVrZp&#012; fbqRXACM9jZ7RBObKnOI8xaCcfPIMZUuj8hId0PRgYER1HUFQrwobsZGeKfY&#012; G9uoNR2NN6oFm.5HGCMb16xfDMcEwZ99LpaAnJoz1l6cu_e6yccpVDLbx3jB&#012; pPEmmSnsqWIXS6GoC8IRW2SOIuxRWxJrl6saJ2zR2Yd48lrFpwina3J16CTm&#012; xbXRa4OH_166dZUGRpB1yvVQ9oeZHE2nWuDvi4VBZJ6KmIbP.PbueCv034Mn&#012; ZETdOT.em6cLKTWza1XhQ5RaiiWcgZl4wrb0olTd6UXzBOXoZ_Aww3REt2EA&#012; ed9_jK5oI3ZUVJvh9a1ww0y77nnl46S3JIxjnpZzLtWSYndbTRajX1.NqRNy&#012; i6U3XwlPdRUp8LJr0h6JiPdy9z9IAAM.Ev988sP6Ofvkt_He_&#012;X-Yahoo-SMTP: tUchoqqswBDoirhKNxGjAwVByD_9vekBb5gtzw8hj.s****.net&#012;To: &lt;*****cox.net&gt;, &lt;customerservice@gtxpress.com&gt;, &lt;sarah.lee@davita.com&gt;, &lt;l@bellsouth.net&gt;, &lt;fcheney@bellsouth.net&gt;, &lt;lisa_ales@baxter.com&gt;, &lt;alan.little@genzyme.com&gt;, &lt;fdcheney@dhr.state.ga.us&gt;&#012;Subject: Fw: &#012; &#012;</pre><!--end code block--><br><small>--<br>Holocaust survivors and their family's fill this out.<br>&raquo;<A HREF="http://online.ushmm.org/registry/update_info/main_form.php" >online.ushmm.org/registr &middot;&middot;&middot; form.php</A><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28294064</guid>
<pubDate>Wed, 15 May 2013 17:32:46 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287949</link>
<description><![CDATA[NetFixer posted : <div class="bquote"><said>said by <a href="/profile/314530" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=314530');">NormanS</a>:</said><p><div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>i know one of the scammers e-mail its out of New Orleans.<br><br>6 months later nothing changed on ATT'S SIDE...<br><br>&raquo;<A HREF="http://www.fbi.gov/newark/press-releases/2013/new-york-man-sentenced-to-41-months-in-prison-for-hacking-at-ts-servers" >www.fbi.gov/newark/press &middot;&middot;&middot; -servers</A><br> </p></div>Okay. A breach of the 3G network, and the compromised email addresses were likely not all '@att.net'.<br><br>For the record, we who read the AT&T DSL forum usually deal with the legacy ADSL service. I, at least, am totally clueless about 3G iPads, because I don't have, or use it. My expertise is limited to the legacy AT&T ADSL service, which is the focus of this forum.<br> </p></div>I have several legacy AT&T DSL email accounts, and I can use an AT&T cell phone to access that email. However, AT&T has not directly provided an email service for their cell phone customers since the new at&t assimilated Cingular (and those old Cingular email accounts were totally closed at that time). You can certainly use their cell phones to access your email, but if that email is an AT&T email account, it is just a coincidence that you have an AT&T email account to access.<br><br>The scam that the OP provided a link to had nothing to do with AT&T email other than that AT&T used an email address (which was not necessarily an AT&T email address) as an account name.<br><br>EDIT: Oops, slow stiff old fingers. I see that you just posted almost the same thing to me while I was typing.  ;)<br><small>--<br>A well-regulated militia, being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.<br><br>When governments fear people, there is liberty. When the people fear the government, there is tyranny.</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287949</guid>
<pubDate>Mon, 13 May 2013 21:32:00 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287930</link>
<description><![CDATA[NormanS posted : 08034016 <A HREF="/useremail/u/465540"><i class='fa fa-user'></i></A> has linked an AT&T 3G iPad database breach. As I read the linked news, the hacked email accounts need not be AT&T Yahoo! accounts; presumably even '@cox.net' accounts can be used to sign up 3G iPad services.<br><br>This legacy AT&T Yahoo! HSI (AT&T DSL) forum would have squat to do with the 3G user data base.<br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287930</guid>
<pubDate>Mon, 13 May 2013 21:26:05 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287902</link>
<description><![CDATA[NetFixer posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p> i wont have this mess go on. Security your Network or get out of the Business ATT.<br> <div class="bquote"><said>said by <a href="/profile/1030204" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1030204');">NetFixer</a>:</said><p>You are going to need some very, very deep pockets if you plan to put AT&T out of business.  <IMG SRC="http://www.dcs-net.net/smiley/roflmao.gif"> <br> </p></div>You need to read that again security their network or get out of this business because they sure aren't doing a dam thing about it.<br> </p></div>No matter how many times I read that quote (or anything else you have posted in this thread), it tells me nothing. How about posting some evidence? Post the <B>full</B> headers from some of these emails you are talking about that you are getting from your sister's (and other's) account(s). Mask the personal information part of the email addresses, but post the <B>full</B> headers other than that privacy edit. That will either prove that the accounts have been hacked, or show if you are simply seeing Joe job emails.<br><br>If this were a "major" security breach as you imply, others would be seeing an increase in AT&T/Yahoo! spam, and would probably be posting about it here (and/or in this forum's Security Forum). A small number of individuals who may have been taken in by a phishing scam and had their email accounts compromised does not constitute an ISP or email provider security breach; and that scenario is what you could easily be describing. <br><br>I have not seen any such increase. There is a phrase often used in Amerika: "Put your money where your mouth is".<br><small>--<br>A well-regulated militia, being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.<br><br>When governments fear people, there is liberty. When the people fear the government, there is tyranny.</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287902</guid>
<pubDate>Mon, 13 May 2013 21:14:19 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287820</link>
<description><![CDATA[NormanS posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>i know one of the scammers e-mail its out of New Orleans.<br><br>6 months later nothing changed on ATT'S SIDE...<br><br>&raquo;<A HREF="http://www.fbi.gov/newark/press-releases/2013/new-york-man-sentenced-to-41-months-in-prison-for-hacking-at-ts-servers" >www.fbi.gov/newark/press &middot;&middot;&middot; -servers</A><br> </p></div>Okay. A breach of the 3G network, and the compromised email addresses were likely not all '@att.net'.<br><br>For the record, we who read the AT&T DSL forum usually deal with the legacy ADSL service. I, at least, am totally clueless about 3G iPads, because I don't have, or use it. My expertise is limited to the legacy AT&T ADSL service, which is the focus of this forum.<br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287820</guid>
<pubDate>Mon, 13 May 2013 20:50:04 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287801</link>
<description><![CDATA[08034016 posted : <div class="bquote"><said>said by <a href="/profile/1030204" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1030204');">NetFixer</a>:</said><p><div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>No one pissed anyone off 60 in 1 day<br> </p></div>It's called collateral damage (if I am interpreting your misinterpretation correctly). And your sister could have also been just collateral damage (or a way to piss off someone else).<br><br><div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p> i wont have this mess go on. Security your Network or get out of the Business ATT.<br> </p></div>You are going to need some very, very deep pockets if you plan to put AT&T out of business.  <IMG SRC="http://www.dcs-net.net/smiley/roflmao.gif"> <br> </p></div>You need to read that again security their network or get out of this business because they sure aren't doing a dam thing about it.<br><small>--<br>Holocaust survivors and their family's fill this out.<br>&raquo;<A HREF="http://online.ushmm.org/registry/update_info/main_form.php" >online.ushmm.org/registr &middot;&middot;&middot; form.php</A><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287801</guid>
<pubDate>Mon, 13 May 2013 20:43:44 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287678</link>
<description><![CDATA[08034016 posted : <div class="bquote"><said>said by <a href="/profile/314530" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=314530');">NormanS</a>:</said><p><div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>No one pissed anyone off 60 in 1 day i wont have this mess go on. Security your Network or get out of the Business ATT.<br> </p></div>Tell it to Yahoo!.<br> </p></div>To my Understanding on what ATT told me they use them, you would think a Multi-billion dollar company would know better and use their system,ATT told me they were hacked  wonder why this wasn't put on this site or the news.......i talked with the person 1 hr about this he stated they had a MAJOR SECURITY BREACH..but yet nothing was said about this until i posted about it?<br><br>Norman<br>i know one of the scammers e-mail its out of New Orleans.<br><br>6 months later nothing changed on ATT'S SIDE...<br><br>&raquo;<A HREF="http://www.fbi.gov/newark/press-releases/2013/new-york-man-sentenced-to-41-months-in-prison-for-hacking-at-ts-servers" >www.fbi.gov/newark/press &middot;&middot;&middot; -servers</A><br><small>--<br>Holocaust survivors and their family's fill this out.<br>&raquo;<A HREF="http://online.ushmm.org/registry/update_info/main_form.php" >online.ushmm.org/registr &middot;&middot;&middot; form.php</A><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28287678</guid>
<pubDate>Mon, 13 May 2013 19:56:51 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285424</link>
<description><![CDATA[NormanS posted : Could also be an easily guessed password. A relative's MSNIA account fell to that:<br><pre class="brush: text">X-Message-Delivery: Vj0xLjE7dXM9MDtsPTE7YT0wO0Q9MDtTQ0w9NA==&#012;X-Message-Status: n&#012;X-SID-PRA: Aunty &lt;********@msn.com&gt;&#012;X-SID-Result: Pass&#012;X-AUTH-Result: PASS&#012;X-Message-Info: m2DhXBI/dWmnvCUeMwzdANPllG7jTe9yKB4KzzCCN0q8QK9IBfkcSo3Oi2Yc0VvPlRyYS+&#012;  CwAaD1FBcEgEhKyKYu+k7DU7uSbUrvw8KXgtdWQS52pOulsg==&#012;Received: from col0-omc4-s15.col0.hotmail.com (&#91;65.55.34.217&#93;)&#012;         by col0-hmmc2-f4.Col0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675);&#012; Mon, 30 May 2011 03:26:19 -0700&#012;Received: from COL109-W47 (&#91;65.55.34.199&#93;)&#012;         by col0-omc4-s15.col0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675);&#012; Mon, 30 May 2011 03:26:19 -0700&#012;Message-ID: &lt;col109-w47EEDF3751818B4D535ADDD27B0@phx.gbl&gt;&#012;Return-Path: ********@msn.com&#012;Content-Type: multipart/alternative;&#012;boundary="_e4f76282-094d-4c10-bb61-5dc852ee18dc_"&#012;X-Originating-IP: &#91;96.8.113.226&#93;&#012;From: Aunty &lt;********@msn.com&gt;&#012;Subject: Pls kindly get back&#012;Date: Mon, 30 May 2011 03:26:19 -0700&#012;Importance: Normal&#012;In-Reply-To: &lt;20090909.232020.8885.0@webmail03.vgs.untd.com&gt;&#012;References: &lt;20090909.232020.8885.0@webmail03.vgs.untd.com&gt;&#012;MIME-Version: 1.0&#012;Bcc:&#012;X-OriginalArrivalTime: 30 May 2011 10:26:19.0484 (UTC) FILETIME=&#91;03DFB1C0:01CC1EB4&#93;&#012; &#012;</pre><!--end code block--><br>The originating IP is near Chicago, but the MSNIA localization, on login, was some place in India. The Chicago IP address likely harbored a spam 'bot.<br><br>So not just Yahoo! ...<br><br>Despite that the spammer did not include a "Return-Path:", my own 'msn.com' address was in the RCPT-TO: list; else I would not have received it.<br><br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285424</guid>
<pubDate>Mon, 13 May 2013 04:29:32 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285386</link>
<description><![CDATA[NetFixer posted : <div class="bquote"><said>said by <a href="/profile/314530" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=314530');">NormanS</a>:</said><p><div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>No one pissed anyone off 60 in 1 day i wont have this mess go on. Security your Network or get out of the Business ATT.<br> </p></div>Tell it to Yahoo!.<br> </p></div>Or perhaps tell the sister who fell for some phish and compromised her own ATT/Yahoo! account; and now her account is being used to <a href="http://search.yahoo.com/r/_ylt=A0oG7lJTjJBRfkgA0txXNyoA;_ylu=X3oDMTE0ajdyc2hnBHNlYwNzcgRwb3MDMQRjb2xvA2FjMgR2dGlkA1NNRTIwM184Mw--/SIG=11o7uk6kc/EXP=1368456403/**http%3a//en.wikipedia.org/wiki/Joe_job">"Joe job"</a> everyone in her address book. For that matter, the sister could also be a Joe job victim herself.<br><small>--<br>A well-regulated militia, being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.<br><br>When governments fear people, there is liberty. When the people fear the government, there is tyranny.</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285386</guid>
<pubDate>Mon, 13 May 2013 02:49:33 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285382</link>
<description><![CDATA[NetFixer posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>No one pissed anyone off 60 in 1 day<br> </p></div>It's called collateral damage (if I am interpreting your misinterpretation correctly). And your sister could have also been just collateral damage (or a way to piss off someone else).<br><br><div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p> i wont have this mess go on. Security your Network or get out of the Business ATT.<br> </p></div>You are going to need some very, very deep pockets if you plan to put AT&T out of business.  <IMG SRC="http://www.dcs-net.net/smiley/roflmao.gif"> <br><small>--<br>A well-regulated militia, being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.<br><br>When governments fear people, there is liberty. When the people fear the government, there is tyranny.</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285382</guid>
<pubDate>Mon, 13 May 2013 02:41:28 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285344</link>
<description><![CDATA[NormanS posted : <div class="bquote"><said>said by <a href="/profile/465540" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=465540');">08034016</a>:</said><p>No one pissed anyone off 60 in 1 day i wont have this mess go on. Security your Network or get out of the Business ATT.<br> </p></div>Tell it to Yahoo!.<br><small>--<br>Norman<br>~Oh Lord, why have you come<br>~To Konnyu, with the Lion and the Drum</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285344</guid>
<pubDate>Mon, 13 May 2013 01:50:45 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285294</link>
<description><![CDATA[08034016 posted : <div class="bquote"><said>said by <a href="/profile/1030204" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1030204');">NetFixer</a>:</said><p>While it is possible that the problem was an AT&T breach, it was more likely a Yahoo! breach (Yahoo! handles AT&T customer email, not AT&T). Yahoo! security breaches have happened numerous times in the past, and will no doubt will continue to happen. Welcome to the Internet.<br><br>Only 60 customers? That sounds like a specific attack, not a general ISP or email host database breach. Perhaps your sister (or some other family member) pissed someone off?<br> </p></div>No one pissed anyone off 60 in 1 day i wont have this mess go on. Security your Network or get out of the Business ATT.<br><small>--<br>Holocaust survivors and their family's fill this out.<br>&raquo;<A HREF="http://online.ushmm.org/registry/update_info/main_form.php" >online.ushmm.org/registr &middot;&middot;&middot; form.php</A><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285294</guid>
<pubDate>Mon, 13 May 2013 00:53:34 EDT</pubDate>
</item>
<item>
<title>Re: [Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285286</link>
<description><![CDATA[NetFixer posted : While it is possible that the problem was an AT&T breach, it was more likely a Yahoo! breach (Yahoo! handles AT&T customer email, not AT&T). Yahoo! security breaches have happened numerous times in the past, and will no doubt will continue to happen. Welcome to the Internet.<br><br>Only 60 customers? That sounds like a specific attack, not a general ISP or email host database breach. Perhaps your sister (or some other family member) pissed someone off?<br><small>--<br>A well-regulated militia, being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.<br><br>When governments fear people, there is liberty. When the people fear the government, there is tyranny.</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Southeast-ATT-Security-Breach-28285286</guid>
<pubDate>Mon, 13 May 2013 00:46:41 EDT</pubDate>
</item>
<item>
<title>[Southeast] ATT Security Breach..</title>
<link>http://www.dslreports.com/forum/Southeast-ATT-Security-Breach-28285221</link>
<description><![CDATA[08034016 posted : ATT Had a Major Security Breach in their system they stole you name it, am getting my sisters emails from her by the Minute from the Hacker  she has Bellsouth which is now known as ATT...<br><br>I contacted ATT up he declined the issues technical support then admitted yes we did,  am with COX.NET and dealing with their Customers spamming me because some so called IT person got his/her degree out of a cereal box..  :)<br><br> SO FAR 60 CUSTOMERS,<br><small>--<br>Holocaust survivors and their family's fill this out.<br>&raquo;<A HREF="http://online.ushmm.org/registry/update_info/main_form.php" >online.ushmm.org/registr &middot;&middot;&middot; form.php</A><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Southeast-ATT-Security-Breach-28285221</guid>
<pubDate>Sun, 12 May 2013 23:44:51 EDT</pubDate>
</item>
</channel>
</rss>
