Protonmail warning message

@Mushy

I've never had contact with olart in any way, though I got the scam mails. After this, I've made myself a new account and only informed one vend from here and got the same mails again. 

So I guess this has to be someone of "us" who has access to the vendor threads and email-addresses, no? But wow and especially 'why' the person is doing this is another question. 

But I think it actually is deeper than we think.
You mean different emails you got the standard phjishing emails to get your login so did i. But people have been getting fake btc wallet addresses in email chains from suppliers

 
I can't edit my suggestion post above, but obviously always update your computer/phone and browser and do not run a operating system that doesn't have current updates/security patches available for it.  That ESPECIALLY goes for all you PC users both because they are infinitely more vulnerable and also seeing as Windows 7 just got obsoleted....

Apparently this method of attack by compromising a machine and then inserting replies in pre-existing email threads is quite common:

https://www.cyberscoop.com/hacking-hijack-palo-alto-networks-spearphishing/

https://www.zdnet.com/article/this-sneaky-phishing-attack-hijacks-your-chats-to-spread-malware/

https://healthitsecurity.com/news/emotet-trojan-resurfaces-hijacking-email-content-from-victims

 
Last edited by a moderator:
The domain olatpharrna does not exist. So its clearly a spoofed email. Have you got the headers for that email?

What does the reply to header say?
I have the full headers to all the phishing emails I received, can post to pastebin or where ever you like. If you can DM me that's fine too.
TL;DR is that the return path for all are protonmail addresses.

 
Last edited:
Looks like Protonmail finally got around to sending out a "Your email was part of a phishing attack" email!!  Link to their blog posting about preventing phishing attacks: Prevention.

 
With any end-to-end encrypted email service you have to accept that security can't be as robust as commercial email services. For example, Gmail logs the shit out of everything you do, including every IP address you use plus every device and browser. This way they can warn you if your account is accessed from a new device or a suspicious IP address. ProtonMail and other end-to-end encrypted email services don't do this, and rightfully so. Anonymity is a bigger priority, so they log as little about you as possible making phishing attacks much more difficult to detect. As long as you have the correct username and password, nothing else matters. They can't check and warn you if your account is logged in from a new device or a suspicious IP because they don't log that stuff in the first place, it's a compromise you just have to accept for wanting to remain anonymous. However, 2FA is something that, IMO, ProtonMail should enable by default on all accounts. It would have prevented all the recent phishing attacks and in-keeping with anonymity, ProtonMail don't require a mobile phone number, they use third party 2FA apps like Authy or Google Authenticator to generate 2FA codes. It's essential that anyone using end-to-end encrypted email also use 2FA, ProtonMail or otherwise. 

 
I have the full headers to all the phishing emails I received, can post to pastebin or where ever you like. If you can DM me that's fine too.
TL;DR is that the return path for all are protonmail addresses.
It depends i dont need the headers for the phishing emails its more the enail in the screeshot above where the scammer seems to jump into the middle of an email chain with his own spoofed email that interested me

 
@tellme   Is this really true?  I never heard of the p0lic3 being able to spy on prot0n and tut@nota?
There's no legal requirement for companies operating under a MLAT to comply with a government agency to create a backdoor in an end-to-end encrypted service. Rumours of open source platforms (which both ProtonMail and Tutanota are) installing secret backdoor's are just that, rumours.

 
There's no legal requirement for companies operating under a MLAT to comply with a government agency to create a backdoor in an end-to-end encrypted service. Rumours of open source platforms (which both ProtonMail and Tutanota are) installing secret backdoor's are just that, rumours.
No. A German court forced Tutanota to providing a back door for authorities, as explained in this (unfurtunately German) news artice: https://www.sueddeutsche.de/digital/tutanota-verschluesselung-e-mail-ueberwachung-polizei-1.4676988

You a right that Switzerland handles this differently. No backdoors but ProtonMail is forced to provide police with mail box content of users if demanded  by a court. Also, ProtonMail are obliged to provide police real-time access to mailboxes if a court demands it.

MLAT means that a foreign country can ask for that and that a Swiss court will approve that. See ProtonMails trsparency report, it proves that Switzerland has become a cooperative country: https://protonmail.com/blog/transparency-report/

Legisltion in Iceland still values privacy and is be the best place for anonymous mail and web hosting, To give an example: Iceland did not sign any MLAT treatiy, and while e.g. Tutanota must keep deleted emails stored for six months, in Iceland, if an email was deleted, it is immediately gone.

The times, they are changing...

 
Last edited:
Wow, just wow. So bout 2 weeks ago after a sketch back n forth with eu i preempteviley deleted permanently my prtnmail and simultanously my device gave up the ghost so was not on here ... fast fwd to now having magazine show up and vendor apparently gone ... gonna have to consider myself somewhat burned even though it came through and a bit uneasy about diving into the reading materials without independent testing... luckily i think i am all set for a while and can wait for testing 

Tl;dr went away and came back to this shitstorm ... damn

 
Last edited by a moderator:
HEY GUYS - -Either my HPPD has finally driven me psychotic, or I just had a couple of emails from the scammer pretending to be a vendor I had contacted!
 

I posted in the respective vendor’s thread, but he’s in the private section so I will post here too. In the morning, I will give the details on what made me think it’s the scammer, but the main part is the language style didn’t match. 

 
Scammer is at it again

Received email 'lockandload"

Pretending to be a reputable vendor here

Beware!

 
Scammer is at it again

Received email 'lockandload"

Pretending to be a reputable vendor here

Beware!
likewise, just came here to post this exact same thing. also received a second one from "support team" wanting to verify a phone number that obviously isn't mine. stay safe out there.

 
I got another scam email too from olart but with a fake email and a confirm my number email
I have a feeling this is gonna go on for awhile so everyone make sure you dot your i's and cross your t's when dealing with any vendor .Myself I deleted my proton email and started fresh with a new one .I am using this one as a test email to see if I get any open scams from vendors here .I am going to start to contact everyone to try and find out who is compromised. I started a new proton because my old one did get compromised.

Stay safe everyone

 
Drugbuyersguide Shoutbox
  1. xenxra @ xenxra: ye
  2. SeaDonkey @ SeaDonkey: Do you have to donate to see the US list? I can't remember but I feel like you might
  3. R @ Rx4health: Im listed under the US Vendor as well...anything I can hrlp with it,send me an email,Im legit , have a great day to you all..
  4. rockychoc @ rockychoc: I am listed under US Vendors
  5. H @ hotdog45: Prices are the same menu is basically the same. Better vendors out there.
  6. T @ timyboy: @aBBazaBBa123 He's in the US list
  7. I @ Irishchestzip: @hotdog45 ya but is one like a copycat of the other or are they both legit? its literally a copy and paste of the whole email.
  8. aBBazaBBa123 @ aBBazaBBa123: @rockychoc where is your page located? I cant find it anywhere.
  9. H @ hotdog45: Prices are the same menu is basically the same. Better vendors out there.
  10. H @ hotdog45: @Irishchestzip . Yes I noticed the same
  11. I @ Irishchestzip: i found 2 vendors who have sent me the exact price list with the same few sentences at the top and same shipping cost. is this strange or does it mean stay away? some of you might know who im talking about .
  12. G @ gigiwink143: Has anyone had dealings with Rx4health
  13. H @ hotdog45: @CalFresh enjoy your family my friend. I hope you have an amazing week with them
  14. Telp @ Telp: Happy mondays everybody. Hopefully y’all got some novels to look forward to today
  15. C @ cheesybread: Got a question for people out there..ive been in and out if this for the better part of a decade..there were a few good serbian vendors, WHY did they disappear?? Its been in the back of my mind for forever and i cannot figure out the reason. Seems like a easy gig, no?
  16. johnnywan @ johnnywan: Kinda panicking cause I can’t get a response from Jacob after 3 1/2 of no drama business. Emailed way too much cause I wasn’t sure what else to do, after I sent the Bitcoin
  17. CnC5 @ CnC5: @xenxra i miss that dude alot 😭😭😭
  18. CalFresh @ CalFresh: just want y'all to know I have family in town this week so will be a little slow to respond. orders will go out but turnaround time may be slightly longer than usual. My apologies in advance. Will be back to normal next week.
  19. CnC5 @ CnC5: @xenxra i miss that dude alot 😭😭😭
  20. xenxra @ xenxra: yes i know i was there lmao
Back
Top