Protonmail warning message

@Mushy

I've never had contact with olart in any way, though I got the scam mails. After this, I've made myself a new account and only informed one vend from here and got the same mails again. 

So I guess this has to be someone of "us" who has access to the vendor threads and email-addresses, no? But wow and especially 'why' the person is doing this is another question. 

But I think it actually is deeper than we think.
You mean different emails you got the standard phjishing emails to get your login so did i. But people have been getting fake btc wallet addresses in email chains from suppliers

 
I can't edit my suggestion post above, but obviously always update your computer/phone and browser and do not run a operating system that doesn't have current updates/security patches available for it.  That ESPECIALLY goes for all you PC users both because they are infinitely more vulnerable and also seeing as Windows 7 just got obsoleted....

Apparently this method of attack by compromising a machine and then inserting replies in pre-existing email threads is quite common:

https://www.cyberscoop.com/hacking-hijack-palo-alto-networks-spearphishing/

https://www.zdnet.com/article/this-sneaky-phishing-attack-hijacks-your-chats-to-spread-malware/

https://healthitsecurity.com/news/emotet-trojan-resurfaces-hijacking-email-content-from-victims

 
Last edited by a moderator:
The domain olatpharrna does not exist. So its clearly a spoofed email. Have you got the headers for that email?

What does the reply to header say?
I have the full headers to all the phishing emails I received, can post to pastebin or where ever you like. If you can DM me that's fine too.
TL;DR is that the return path for all are protonmail addresses.

 
Last edited:
Looks like Protonmail finally got around to sending out a "Your email was part of a phishing attack" email!!  Link to their blog posting about preventing phishing attacks: Prevention.

 
With any end-to-end encrypted email service you have to accept that security can't be as robust as commercial email services. For example, Gmail logs the shit out of everything you do, including every IP address you use plus every device and browser. This way they can warn you if your account is accessed from a new device or a suspicious IP address. ProtonMail and other end-to-end encrypted email services don't do this, and rightfully so. Anonymity is a bigger priority, so they log as little about you as possible making phishing attacks much more difficult to detect. As long as you have the correct username and password, nothing else matters. They can't check and warn you if your account is logged in from a new device or a suspicious IP because they don't log that stuff in the first place, it's a compromise you just have to accept for wanting to remain anonymous. However, 2FA is something that, IMO, ProtonMail should enable by default on all accounts. It would have prevented all the recent phishing attacks and in-keeping with anonymity, ProtonMail don't require a mobile phone number, they use third party 2FA apps like Authy or Google Authenticator to generate 2FA codes. It's essential that anyone using end-to-end encrypted email also use 2FA, ProtonMail or otherwise. 

 
I have the full headers to all the phishing emails I received, can post to pastebin or where ever you like. If you can DM me that's fine too.
TL;DR is that the return path for all are protonmail addresses.
It depends i dont need the headers for the phishing emails its more the enail in the screeshot above where the scammer seems to jump into the middle of an email chain with his own spoofed email that interested me

 
@tellme   Is this really true?  I never heard of the p0lic3 being able to spy on prot0n and tut@nota?
There's no legal requirement for companies operating under a MLAT to comply with a government agency to create a backdoor in an end-to-end encrypted service. Rumours of open source platforms (which both ProtonMail and Tutanota are) installing secret backdoor's are just that, rumours.

 
There's no legal requirement for companies operating under a MLAT to comply with a government agency to create a backdoor in an end-to-end encrypted service. Rumours of open source platforms (which both ProtonMail and Tutanota are) installing secret backdoor's are just that, rumours.
No. A German court forced Tutanota to providing a back door for authorities, as explained in this (unfurtunately German) news artice: https://www.sueddeutsche.de/digital/tutanota-verschluesselung-e-mail-ueberwachung-polizei-1.4676988

You a right that Switzerland handles this differently. No backdoors but ProtonMail is forced to provide police with mail box content of users if demanded  by a court. Also, ProtonMail are obliged to provide police real-time access to mailboxes if a court demands it.

MLAT means that a foreign country can ask for that and that a Swiss court will approve that. See ProtonMails trsparency report, it proves that Switzerland has become a cooperative country: https://protonmail.com/blog/transparency-report/

Legisltion in Iceland still values privacy and is be the best place for anonymous mail and web hosting, To give an example: Iceland did not sign any MLAT treatiy, and while e.g. Tutanota must keep deleted emails stored for six months, in Iceland, if an email was deleted, it is immediately gone.

The times, they are changing...

 
Last edited:
Wow, just wow. So bout 2 weeks ago after a sketch back n forth with eu i preempteviley deleted permanently my prtnmail and simultanously my device gave up the ghost so was not on here ... fast fwd to now having magazine show up and vendor apparently gone ... gonna have to consider myself somewhat burned even though it came through and a bit uneasy about diving into the reading materials without independent testing... luckily i think i am all set for a while and can wait for testing 

Tl;dr went away and came back to this shitstorm ... damn

 
Last edited by a moderator:
HEY GUYS - -Either my HPPD has finally driven me psychotic, or I just had a couple of emails from the scammer pretending to be a vendor I had contacted!
 

I posted in the respective vendor’s thread, but he’s in the private section so I will post here too. In the morning, I will give the details on what made me think it’s the scammer, but the main part is the language style didn’t match. 

 
Scammer is at it again

Received email 'lockandload"

Pretending to be a reputable vendor here

Beware!

 
Scammer is at it again

Received email 'lockandload"

Pretending to be a reputable vendor here

Beware!
likewise, just came here to post this exact same thing. also received a second one from "support team" wanting to verify a phone number that obviously isn't mine. stay safe out there.

 
I got another scam email too from olart but with a fake email and a confirm my number email
I have a feeling this is gonna go on for awhile so everyone make sure you dot your i's and cross your t's when dealing with any vendor .Myself I deleted my proton email and started fresh with a new one .I am using this one as a test email to see if I get any open scams from vendors here .I am going to start to contact everyone to try and find out who is compromised. I started a new proton because my old one did get compromised.

Stay safe everyone

 
Drugbuyersguide Shoutbox
  1. Wicked @ Wicked: Whatsup!!
  2. Dr-Octagon @ Dr-Octagon: Sup dbg famo
  3. tiquanunderwood @ tiquanunderwood: Despite my team being decimated
  4. tiquanunderwood @ tiquanunderwood: Just a fun season this year.
  5. tiquanunderwood @ tiquanunderwood: Yeah man. Lamar did it his rookie year. We've gone on runs. Should be fun. Especailly with Flacco!
  6. L @ Layne_Cobain: Go 8-3 rest of the way could very well get in at 9-8 wild card team
  7. L @ Layne_Cobain: @tiquanunderwood feel for yah my guy from what I’ve heard he should b back after bye you’re in a hole no doubt 1-5 but I don’t think it’s over yet for yah 3 games back Pitt has had a soft ass schedule no one seems to b talking about gets a lot harder
  8. tiquanunderwood @ tiquanunderwood: me. Hopefully Lamar comes back next week
  9. tiquanunderwood @ tiquanunderwood: Happy football Sunday! Bye week for ne,
  10. Dr-Octagon @ Dr-Octagon: This thing glitchn too
  11. Dr-Octagon @ Dr-Octagon: Fr
  12. Finger-of-God @ Finger-of-God: Fridays are always fun! Preparing for the weekend rush
  13. Thoth @ Thoth: Happy Friday ! Let’s get it !
  14. L @ Layne_Cobain: Happy friday @jjjjjjjjj and everyone else time 4 chillin ‘n killin
  15. J @ jjjjjjjjj: Happy Friday everyone! And happy Gucci Mane day (10/17)!
  16. O @ ochemdim: @xenxra don’t sweat it, that’s part of investing, especially crypț0. Never invest (or bet) more than you can afford to lose, that’s rule #1. Also, if someone is right most of the time like you, that’s unusual and it’s awesome you’re willing to share with us. Please keep the recommendations coming!
  17. xenxra @ xenxra: also, to that effect, i'm a bit behind on the whole C/R situation, that being said - this is the first time in 16 months that the market pulled back and C did not DM me on telegram about it.
  18. xenxra @ xenxra: i want to apologize to the people on here for my calls about the market moving up three days before the crash. the crash we had was essentially a black swan (i.e. an accident) and as is the very nature of "accidents", they usually cannot be accounted for beforehand. a LOT of people got wiped out on that move but I do think we still push for new highs across the board sooner than later as long as Bitcoin stays above $105k.
  19. O @ oh be g: And I agree w u shit happens
  20. Dr-Octagon @ Dr-Octagon: A pleasure
Back
Top