Mail Bombers

In Internet usage, mail bombers (or e-mail bombers) are those that perpetrate a form of net abuse consisting of sending large volumes of e-mails to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack (DoS attack).

There are two methods of carring out an e-mail bomb mass mailing and list linking.
  • Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a DDoS attack by employing the use of “zombie” botnets; hierarchical networks of computers compromised by malware and under the attacker’s control. Similar to their use in spamming, the attacker instructs the botnet to send out millions or even billions of e-mails, but unlike normal botnet spamming, the e-mails are all addressed to only one or a few addresses the attacker wishes to flood.
  • List linking means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. In order to prevent this type of bombing, most email subscription services send a confirmation email to a person’s inbox when that email is used to register for a subscription.

How Can You Detect Mail Bombers?

Download SpyHunter’s Detection Scanner
to Detect Mail Bombers.
* SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are 2 articles listed on mail bombers.

Name Threat Level Detection Count Date
Aenima May 14, 2009
Fake-Mailer 55/10 97 May 14, 2009

Search by Letter: A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  
Home | SpyHunter Risk Assessment Model | Privacy Policy | EULA | Additional Terms and Conditions
Copyright 2003-2017. Enigma Software Group USA, LLC. All Rights Reserved.