Protonmail warning message

@Mushy

I've never had contact with olart in any way, though I got the scam mails. After this, I've made myself a new account and only informed one vend from here and got the same mails again. 

So I guess this has to be someone of "us" who has access to the vendor threads and email-addresses, no? But wow and especially 'why' the person is doing this is another question. 

But I think it actually is deeper than we think.
You mean different emails you got the standard phjishing emails to get your login so did i. But people have been getting fake btc wallet addresses in email chains from suppliers

 
I can't edit my suggestion post above, but obviously always update your computer/phone and browser and do not run a operating system that doesn't have current updates/security patches available for it.  That ESPECIALLY goes for all you PC users both because they are infinitely more vulnerable and also seeing as Windows 7 just got obsoleted....

Apparently this method of attack by compromising a machine and then inserting replies in pre-existing email threads is quite common:

https://www.cyberscoop.com/hacking-hijack-palo-alto-networks-spearphishing/

https://www.zdnet.com/article/this-sneaky-phishing-attack-hijacks-your-chats-to-spread-malware/

https://healthitsecurity.com/news/emotet-trojan-resurfaces-hijacking-email-content-from-victims

 
Last edited by a moderator:
The domain olatpharrna does not exist. So its clearly a spoofed email. Have you got the headers for that email?

What does the reply to header say?
I have the full headers to all the phishing emails I received, can post to pastebin or where ever you like. If you can DM me that's fine too.
TL;DR is that the return path for all are protonmail addresses.

 
Last edited:
Looks like Protonmail finally got around to sending out a "Your email was part of a phishing attack" email!!  Link to their blog posting about preventing phishing attacks: Prevention.

 
With any end-to-end encrypted email service you have to accept that security can't be as robust as commercial email services. For example, Gmail logs the shit out of everything you do, including every IP address you use plus every device and browser. This way they can warn you if your account is accessed from a new device or a suspicious IP address. ProtonMail and other end-to-end encrypted email services don't do this, and rightfully so. Anonymity is a bigger priority, so they log as little about you as possible making phishing attacks much more difficult to detect. As long as you have the correct username and password, nothing else matters. They can't check and warn you if your account is logged in from a new device or a suspicious IP because they don't log that stuff in the first place, it's a compromise you just have to accept for wanting to remain anonymous. However, 2FA is something that, IMO, ProtonMail should enable by default on all accounts. It would have prevented all the recent phishing attacks and in-keeping with anonymity, ProtonMail don't require a mobile phone number, they use third party 2FA apps like Authy or Google Authenticator to generate 2FA codes. It's essential that anyone using end-to-end encrypted email also use 2FA, ProtonMail or otherwise. 

 
I have the full headers to all the phishing emails I received, can post to pastebin or where ever you like. If you can DM me that's fine too.
TL;DR is that the return path for all are protonmail addresses.
It depends i dont need the headers for the phishing emails its more the enail in the screeshot above where the scammer seems to jump into the middle of an email chain with his own spoofed email that interested me

 
@tellme   Is this really true?  I never heard of the p0lic3 being able to spy on prot0n and tut@nota?
There's no legal requirement for companies operating under a MLAT to comply with a government agency to create a backdoor in an end-to-end encrypted service. Rumours of open source platforms (which both ProtonMail and Tutanota are) installing secret backdoor's are just that, rumours.

 
There's no legal requirement for companies operating under a MLAT to comply with a government agency to create a backdoor in an end-to-end encrypted service. Rumours of open source platforms (which both ProtonMail and Tutanota are) installing secret backdoor's are just that, rumours.
No. A German court forced Tutanota to providing a back door for authorities, as explained in this (unfurtunately German) news artice: https://www.sueddeutsche.de/digital/tutanota-verschluesselung-e-mail-ueberwachung-polizei-1.4676988

You a right that Switzerland handles this differently. No backdoors but ProtonMail is forced to provide police with mail box content of users if demanded  by a court. Also, ProtonMail are obliged to provide police real-time access to mailboxes if a court demands it.

MLAT means that a foreign country can ask for that and that a Swiss court will approve that. See ProtonMails trsparency report, it proves that Switzerland has become a cooperative country: https://protonmail.com/blog/transparency-report/

Legisltion in Iceland still values privacy and is be the best place for anonymous mail and web hosting, To give an example: Iceland did not sign any MLAT treatiy, and while e.g. Tutanota must keep deleted emails stored for six months, in Iceland, if an email was deleted, it is immediately gone.

The times, they are changing...

 
Last edited:
Wow, just wow. So bout 2 weeks ago after a sketch back n forth with eu i preempteviley deleted permanently my prtnmail and simultanously my device gave up the ghost so was not on here ... fast fwd to now having magazine show up and vendor apparently gone ... gonna have to consider myself somewhat burned even though it came through and a bit uneasy about diving into the reading materials without independent testing... luckily i think i am all set for a while and can wait for testing 

Tl;dr went away and came back to this shitstorm ... damn

 
Last edited by a moderator:
HEY GUYS - -Either my HPPD has finally driven me psychotic, or I just had a couple of emails from the scammer pretending to be a vendor I had contacted!
 

I posted in the respective vendor’s thread, but he’s in the private section so I will post here too. In the morning, I will give the details on what made me think it’s the scammer, but the main part is the language style didn’t match. 

 
Scammer is at it again

Received email 'lockandload"

Pretending to be a reputable vendor here

Beware!

 
Scammer is at it again

Received email 'lockandload"

Pretending to be a reputable vendor here

Beware!
likewise, just came here to post this exact same thing. also received a second one from "support team" wanting to verify a phone number that obviously isn't mine. stay safe out there.

 
I got another scam email too from olart but with a fake email and a confirm my number email
I have a feeling this is gonna go on for awhile so everyone make sure you dot your i's and cross your t's when dealing with any vendor .Myself I deleted my proton email and started fresh with a new one .I am using this one as a test email to see if I get any open scams from vendors here .I am going to start to contact everyone to try and find out who is compromised. I started a new proton because my old one did get compromised.

Stay safe everyone

 
Drugbuyersguide Shoutbox
  1. Gluonimatrix @ Gluonimatrix: 😽
  2. Professor_ @ Professor_: Good Morning everyone
  3. CalFresh @ CalFresh: happy Tuesday!
  4. T @ Thedoccc: Thank you all, as my wife says "God squeezes, but doesn't choke"
  5. N @ necromedic: @Thedoccc: Congratulations! The Father is merciful, and His blessings know no bounds.
  6. J @ jjjjjjjjj: @Thedoccc Congrats!! So happy for you!!
  7. WTF7218 @ WTF7218: Congratulations Thedoccc! That’s great news.
  8. L @ Layne_Cobain: Congrats bro!!! That’s awesome happy for yah you can let that stress go…stress is the enemy
  9. T @ Thedoccc: Hey y'all, wanted to tell you that I signed that second contract I was hoping for. Which should keep me afloat for the rest of the year, and hopefully 2026 if all goes well. Appreciate your encouragement, love, prayers and out reach. I was really feeling low last week and needed that extra bit of <3
  10. tiquanunderwood @ tiquanunderwood: hahhah right on man. they spent so much bread.
  11. L @ Layne_Cobain: Could b worse dude could be a met fan right now 😂 that payroll and no playoffs 😳 I kinda feel bad for em such an insane collapse and so insanely opposite of what happened last year with them starting terrible then catching fire all the way to the nlcs
  12. tiquanunderwood @ tiquanunderwood: That Texas playoff series last year crushed out spirits lmao. They wrecked us.
  13. tiquanunderwood @ tiquanunderwood: No you're pretty much spot on. We've been playing better since the firing of Hyde but I think it's just coincidence. Even though he was terrible at putting the correct relievers in at the wrong time.
  14. L @ Layne_Cobain: Exactly didn’t make a good enough offer to Burnes to keep him and didn’t go after any other top pitching then when things were over come deadline traded away a bunch altho I don’t think any of them besides O’hearn and maybe a reliever or two were doing that well but I could be remembering wrong
  15. tiquanunderwood @ tiquanunderwood: *bucks
  16. tiquanunderwood @ tiquanunderwood: Just needed pitching. And mister big buks didn't spend sh1it hahhaha.
  17. tiquanunderwood @ tiquanunderwood: We were stacked and ready to go.
  18. tiquanunderwood @ tiquanunderwood: I'm in the same boat as you. The blame goes on the owner and Elias (our GM)
  19. L @ Layne_Cobain: I was just thinking that bro I honestly didn’t think Hyde was all that bad but when things go south it’s usually the managers on the chopping block to make the point …I think there’s some decent managers out there looking for a spot
  20. tiquanunderwood @ tiquanunderwood: Be interesting to see who our manager is next year.
Back
Top