I could have also said phising.
It happend to me yesterday (reconstructing events):
- Phising email sent to users.
- Some of them are always stupid to reply
- and they send their password of course
- or submit the google form (reporting abuse on google forms is futile, google does not care)
- Some time later something or someone (I suspect part of it is human) logs in with the password.
- They use the web interface (which can be ajax, so not sure how/if it can be automated reliably).
- They send millions of spam. (They do not hurry, but it is still recognisable. At least from the bounce rate.)
- the sent spam is retained in the outbox
The good news is that this supplies valueable metrics to setup my rate limiting policy daemon.
Add a comment