I recently switched my mail/domain from Google to name cheap. I’ve been keeping a critical eye on my junk mail as the spam filtering doesn’t seem as good.

I saw neat scam email from my own email adress. It was the usual “I am a hacker give me money” nonsense but the trick with them using my own email adress is pretty neat. I assume they’ve injected some sort of common replace string?

Just curious if anyone knows the trick here.

Update: followed the advice most of you have provided and spam mail has gone way down as a result. Leaving post here for the next poor sod who runs into these problems. Maybe Google will lead folks here instead of reddit.

Thank you kind strangers.

  • @orangeNgreen
    link
    English
    11 year ago

    Is it possible they actually accessed your account? Alternatively, do you have a lowercase “L” in your name that they could have replaced with a capital “I”?

    • SeigestOP
      link
      fedilink
      English
      51 year ago

      No Ls also nothing in my sent box and it was marked as spam so rhe mail service knew somthing was up with it.

    • @[email protected]
      link
      fedilink
      21 year ago

      Dunno who’s downvoting this, but that’s honestly a valid possibility. The other answers explain a really important concept (it’s really easy to fake from addresses) but these ideas aren’t wrong.

      • Dr Cog
        link
        fedilink
        11 year ago

        It’s not a possibility at all unless the “hacker” is extremely stupid.

        If you have access to an account, you generally don’t want to make the owner of the account suspect that it is compromised.

        • @[email protected]
          link
          fedilink
          1
          edit-2
          1 year ago

          Or the “hacker” is an automated script (…which is probably pretty stupid, to your point), as the vast majority of attacks are.

          If it’s more like a spearphishing-to-impersonate attack-- i.e. A specific individual is being targeted-- then yeah, it’d be important to avoid detection. They wouldn’t do that unless they are extremely bad at their task.

          But most attacks are fairly coarse attempts at exploiting a rather glaring security hole against a large number of targets, and their goal might not be what you’d think… Like for example “iterate through this list of 100,000 sites, see if they’re using [some vulnerable framework], and see if they still have the default admin password.” The attacker doesn’t care about being foiled by any one victim, because (for example) their goal is to collect accounts that are:

          a) Unmonitored by their owners, and;

          b) Able to send and receive emails

          Is that scenario more likely than FROM address forgery? No. Is that scenario “not a possibility at all?” Also no.