Subscription Bombing, also known colloquially as Mailing List Bombing or simply List Spam, is an obfuscation technique used by attackers who have compromised some of a user’s personal and financial information. In essence, the user’s email address is being used to sign up for hundreds, often thousands, of newsletters or mailing lists worldwide in order to inundate their Inbox with “Welcome to So-and-So Newsletter” and “Please confirm your Subscription” emails. These messages can safely reach their Inbox through UpStream’s email filters because they are coming from legitimate sources: these are real websites with proper domain tenancy and a good email reputation, not the commonly used ‘disposable’ domains that many spammers so often use with their terribly misspelled and badly formatted emails.
The attackers will use a series of bots that to sign up for subscriptions using the user’s email address at any and all sorts of websites, including well known ones here in the United States, but also tons of overseas websites that do not necessarily require a confirmation of an opt-in for new sign-ups or may not have the common CAPTCHA protections to mitigating botting. This will often get supplemented by them using a bunch of compromised email accounts from various free email hosting services to add some additional traffic on top of the ones coming in from official websites. There are a few key clues to identify emails originating as part of a Subscription Bombing attack, beyond just the usual unexpected nature of receiving so many at once:
So there are a ton of emails in your user’s Inbox now. Why did this happen? The short answer is the same as the reason for essentially any other kind of attack: money. As mentioned before, the attacker has some personal and financial information of the user. This could come in a few forms: maybe they have a credit card number and know which email address is associated with it, but they don’t have access to that email account. Sometimes they’ll have access to both the email address and credit card, which increases the dangers involved (more on that in the next section). Occasionally, they may have access to a digital payment service, like PayPal, but not the email address. In almost all possible scenarios, the attacker often only has “some” level of access. The reason these emails are coming in is because the attacker has “partial” access to the user’s identity; i.e. they have access to, for example, an Amazon.com account and can buy products via a saved payment method, but what they lack is the access to the bank account that the payment method uses, so maybe they cannot directly transfer money out of it. Any purchase made generates a notification, as well as a subsequent shipping notification afterwards.
These notifications are the reason why subscription bombing exists: because the attacker only has '“partial” access. They may not be able to turn off or change the notifications, and when you receive such notifications, the user tends to look at them and possibly question what this was. Any subsequent checks on a mysterious purchase or money transfer will usually reveal unauthorized activity and a call to that vendor or financial institution to stop the transaction. If this is done in time, the attackers plan is foiled and they get nothing. So, they sign up the email address (the one associated with the account they are stealing from) and have it blasted with tons of other emails to cover their tracks and delay any discovery of their fraud. Trying to sift through hundreds or thousands of emails, some legitimate, some not, is a true chore and buys them time for the transaction to complete successfully
Paypal, Venmo, Zelle, Credit Cards of all kinds, bank accounts (checking, savings, money market, etc) and even investment accounts can be struck this way.
With all this background provided, what do we do now?
To begin, check with all financial institutions or services that are used commonly, either over the phone or from a known-secure computer, not necessarily the computer or phone commonly used (in case it is compromised and could deepen the access the attacker has to other accounts).
These include bank accounts, credit card vendors, investment firms, digital payment services like Zelle and PayPal and commonly used online vendors where your payment information may be saved, such as Amazon.com, eBay.com, Etsy.com, HomeDepot.com, etc.
Checking on each one of these for unexpected charges or transactions is the very first step in finding out what has occurred. If any suspect charges are identified, contact the provider and have them not only cancel any recent transactions, but alert them of the potential fraud situation and to issue a new credit card or to freeze the account and create a new one (depending on their best practices).
For other accounts, changing the password of the account and layering on MultiFactor Authentication (MFA) is a great start to a defense-in-depth approach that makes these situations far less dicey a proposition for a successful attack. Hardware tokens for MFA, such as a Yubikey, are great additions which provide far superior security than One Time Password mechanisms (OTP) that are the most commonly used MFA.
If the person being attacked was any sort of financial controller, accountant or someone else with access to corporate finances, not only will personal accounts be attacked, but corporate ones may be just as vulnerable and should be checked also.
For more advanced security reviews, UpStream recommends the below steps:
For assistance any of these steps, please contact UpStream Support and we can help or point you in the right direction for more advanced needs, like Indicator of Compromise (IoC) remediation or user training services.