• ohellidk@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    60
    arrow-down
    1
    ·
    1 year ago

    I really wish they could check phone numbers. I’ve been getting a TON of spam recently and it would be interesting to see where it’s coming from.

    • remotelove@lemmy.ca
      link
      fedilink
      English
      arrow-up
      24
      ·
      1 year ago

      There has likely been an evolution of war dialers. It’s probably easier to blast through every possible number once a year, and sell a list of every valid number. Targeting specific area codes is probably faster and would avoid some legal problems.

    • SmokedBillionaire@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      14
      ·
      1 year ago

      This is a really dumb fix that I started using several months ago when I was getting 5 or 6 spam calls a day.

      I would answer, and if they asked for my name or whoever lives at my address I would tell them they have the wrong number, I’m not them, I don’t have a house, whatever. Anything to make them positively sure that the person they are looking for does not exist here. Within 1 week the calls dropped off significantly. Now, about 5 months later I get maybe one call per month.

      • spooky2092@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 year ago

        Another thing that helps is to answer and immediately mute your line so the caller only hears an empty line. Spam dialers hang up and eventually mark the number as invalid, and most people who are real callers will prompt with a hello or something. I did that for a while before I got the Google call screen, which cut it down even more.

    • vollkorntomate
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      You could in the past (until around 1-2 years ago). I don’t know why it changed, though.

    • spooky2092@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      I’ve gotten a lot less spam calls since I started using the Google assist call screener. I get legitimate calls that hang up because my idiot ops guys can’t listen to the recording and say what they need to when they call me direct instead of my office redirect line, but it also seems to chase off the spammers if they know their AI has to get through my AI to even have a chance at trying to scam me, since I’m a harder target than average.

      • 9tr6gyp3@lemmy.world
        link
        fedilink
        English
        arrow-up
        31
        arrow-down
        1
        ·
        1 year ago

        I doubt it. Probably just means some website i signed up to using that email was compromised and had all their data leaked.

          • phlegmy@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 year ago

            I don’t think that’s guaranteed to be true.

            A very old email of mine which I haven’t used in many years was in the breach.
            None of my other email addresses were in there, so it’s highly unlikely that I was affected by this malware in the last decade.
            That email has been in many other breaches however, so I wouldn’t be surprised if somebody who had access to an old dump was infected.
            My money’s on some random skid who downloaded an old database dump and got infected when they downloaded some bad warez.

            Either that, or this includes credentials from people who had the malware 15+ years ago.

            • Manifish_Destiny@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 year ago

              Then they must have tried your password and saved it to one of a specific number of places. Infostealers are by definition a class of malware, which means it’s got to be installed somewhere with access to the directory storing the credential.

              Or it was from an old computer, or mislabeled.

              https://www.youtube.com/watch?v=L3f9do5mtT8

              Here’s a good talk on infostealers for anyone curious.

  • randombullet@programming.dev
    link
    fedilink
    English
    arrow-up
    19
    ·
    1 year ago

    I found the stupid piece of malware that leaked my info.

    TrojanDownloader:MSIL/FormBook.D!MTB

    Installed alongside a pirated photo editing software back in 2021

  • simple@lemm.ee
    link
    fedilink
    English
    arrow-up
    18
    ·
    1 year ago

    Finally, a data breach that doesn’t include me. Good to know I dodged it.

  • ramble81@lemm.ee
    link
    fedilink
    English
    arrow-up
    17
    ·
    1 year ago

    I just always assume my info has been leaked and use randomly generated passwords and 2FA where possible as well as “not-real” security questions.

  • Jax@l.hostux.net
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 year ago

    I don’t understand how to find out which specific sites had my data leaked. Without that I can’t take any action. I’m subscribed to email alerts but the alert did not include any details like the article said it would.

    • Illecors@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      Rent a domain Set up email Use a unique address for every website

      I usually pick the domain of the website as the username part.

      So if, say, I have email set up on lemmy.cafe and want to sign up to flatearth.com - I’d probably use flatearth.com@lemmy.cafe for an email address. If they ever leak it - I’ll be reveiving spam sent to this address.

      In the six years of hosting my own email I’ve only had one such occurence when namecheap got breached. It was nice being able to tell where the culprit was!

    • boatswain
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      As another poster detailed, this is not a company that exposed your info: these credentials are all from stealer logs, which are logs of credentials stolen by keyloggers installed on machines. If your credentials were in this report, it means that you’ve entered that username and password on a machine with malware on it. Could be your personal machine, or it could be some other computer you’ve used.

      • Jax@l.hostux.net
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        That’s true. My point was just that the important thing here is knowing personally which domains were affected so one can personally change those sets of credentials. If I don’t know which of my credentials leaked then there’s no value to me.

        I was able to finally get access and did change the specific credential that had leaked (again, not assigning blame to any specific site here).