Mail Bombers

In Internet usage, mail bombers (or e-mail bombers) are those that perpetrate a form of net abuse consisting of sending large volumes of e-mails to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack (DoS attack).

There are two methods of carring out an e-mail bomb mass mailing and list linking.

  • Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a DDoS attack by employing the use of “zombie” botnets; hierarchical networks of computers compromised by malware and under the attacker’s control. Similar to their use in spamming, the attacker instructs the botnet to send out millions or even billions of e-mails, but unlike normal botnet spamming, the e-mails are all addressed to only one or a few addresses the attacker wishes to flood.
  • List linking means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. In order to prevent this type of bombing, most email subscription services send a confirmation email to a person’s inbox when that email is used to register for a subscription.

How Can You Detect Mail Bombers? Check for Mail Bombers with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Mail Bombers as well as a one-on-one tech support service.

Download SpyHunter's Malware Scanner to Detect Mail Bombers
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. To understand our policies, please review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are currently 2 articles listed on mail bombers.

Name Threat Level Detection Count Date
Aenima February 3, 2008
Fake-Mailer 5/10 0 March 21, 2008

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9