I received a notification last night that someone changed my shipping address on Macys.com and when I visited the website, there was an open order for a PS5 with delivery to a NJ address.
After logging into Macy’s I got 43 emails at once to seven different services like “Excalidraw” and “Sportograf” trying to login using a magic link.
At this point was was pretty nervous so I checked my main email security. Sure enough, there have been repeated login attempts under my account going on every few minutes for weeks.
I also saw there was an attempted login to my cellphone or home internet company.
I use 2FA, authenticators, etc. Basically what else should I be doing? Is there any way to be more preventative? I really don’t wanna chuck this email but it is possible that may be the safest recourse. I do use this email for almost 300 different accounts to various things though.
8/23 update
So I received this suspicious email as a “note to self” from Microsoft in my junk folder. It says it’s from my address but additionally says it’s an “unverified server.” I am leery of it being legit but it is oddly timed.
I’ve added the opening text of the email: “Hello pervert, I’ve sent this message from your Microsoft account.
I want to inform you about a very bad situation for you.
However, you can benefit from it, if you will act wisely.
Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, macOS and Windows. I guess, you already figured out where I’m getting at.”
I’ve received these emails in the past and nothing, but I figure it bears mentioning here cause I was legitimately in a less than secure situation a few days ago.
It goes without saying that you should change your passwords immediately. Do you use the same password for multiple things? If so, stop that.
And use a password manager like Bitwarden
Bitwarden and Bitwarden Authenticator are the GOATs.
If you pay for bitwarden or self-host the normal app can also be an authenticator, with the added ability to sync the codes.
Bitwarden is awesome! I used it for like three years, but I recently moved everything to Keepass. Only thing with Keepass is having to manage your own backups
why did you change? bitwarden is the best, what benefit did you gain? also sounds way cooler than keepass
Bitwarden is great because they’re convenient. However, I figure that becoming self-reliant on maintaining my own password database wouldn’t be a bad idea. I believe storing everything locally gives me just a tad more security in case something were to happen with Bitwarden.
You could self-host vaultwarden
I’ve not got the knowhow to do that. I’m also not in charge of the family router so I haven’t got the permissions to really manage my own server anyway. Someday I’ll have my own place and I’ll probably put something together but I’m pretty satisfied with Keepass :)
Makes sense, if you ever need help with self hosting you can DM me on Matrix. The address is on my profile description.
you can save it locally with bitwarden.
Why did you move to KeePass? I host my own vaultwarden instance for myself and my friends.
I wanted to try something new and I also figure it’s a bit more future-proof in case Bitwarden ever decides to change their pricing models such that the free tier loses any features.
I’m sure self-hosting your password manager gives you some awesome bonuses but I don’t have the knowhow nor do I have control over the family internet router so I don’t think I can work that out just yet.
Password reuse is a real mother fucker. Good luck.
To add on, it sounds like you were phished. No shame, it happens to everyone. The best course of action when you get an email like that, DONT click the easy to press recover account button in the email. Always go directly to the site, even if the email looks legit.
From there you entered your password into, what im assuming, was a fake Macys website, where you gave the bad actors the exact info they needed to really activate it.
This sounds like EXACTLY what happened.
To add on to everyone else mentioning it, another benefit to password managers is that they auto filter themselves to the URL. So if you have a password saved for macys.com and get phished to macys-passwordreovery.com, the password manager won’t know the URL and offer no filtering. Adding the extra step of having to manually find your password entry should be a flag itself that something might be wrong.
Firstly, probably remove the address from the OP. Don’t want any Lemmy vigilantes getting involved and making a mess of things.
If you have 2fa enabled, you should be good. Even if they do guess your password, they shouldn’t* be able to log in to your account. Although might still be worth making sure you have a nice strong password anyway. Also, if you have recovery phone numbers or email addresses attached to your email account, make sure they’re secured as well.
* Assuming that your webmail provider is doing everything correctly, which isn’t always a given if they’re a small one.
I’m okay with the attacker’s IP being public domain
You’re assuming that the attacker is using their own IP rather than a compromised system owned by someone else.
Likewise, they might be using someone else’s address with the intent to steal a package from their porch or something.
It’d be rather silly for a theif to use their own details.
These losers train each other to try to remote desktop into victims’ machines.
OP probably also needs to secure their mobile account, since the attacker could redirect recovery or MFA SMSs to their own number.
Check if your email service has an option to log off from all devices first. This will close any active sessions and prevent anyone that might be already logged in to do anything without logging in again.
Then change your password.
If you have 2FA, try to use something like an authenticator app instead of a cell phone number to receive an SMS message. Sim cards can be cloned. Authenticator apps can’t.
It’s worth noting that the option to log out all devices sometimes doesn’t happen immediately. Microsoft’s 365, for example, isn’t immediate for all devices. If a massive player doesn’t behave the way a user might expect, that’s indicative of how chaotic the landscape can be. Good luck!
Are you also getting a bunch of random “confirm your email address” or thank you for signing up" emails?
This sounds like it may be part of a registration bomb attack. I woke up to over 4,000 similar messages a little while back. What they were doing is hiding their actual activity by flooding my inbox. Among the thousands of emails was a notification about the new user added to my PayPal account that had been compromised. That user was trying to empty my bank account.
I caught it before any damage could be done, and the registration bomb ended shortly afterwards.
Actually that did happen at the same time now that you mention it. I managed to catch it quick though. It did happen shortly after midnight. Luckily I’m a night owl and was awake.
How did you find that one email among 4000 sign up confirmations?
It was in the first couple hundred, and I was being selective in what I read. Newsletter and verification emails could be safely ignored, while services I actually have that are attached to my bank accounts get a closer look.
I would contact support and report that address to the police. Other than that check https://haveibeenpwned.com/ and change your password to something unreasonable with >1000 characters or close to the limit of what they allow.
How are that many characters useful? Where is the benefit of 1000, let alone more than that, compared to 50?
Not much, but that’s what I do.
There are much better ways of creating strong passwords than just adding a ton of characters.
May not apply here but
Note sometimes fraudsters use email bombing when they place orders on an account of yours. They want you to miss the order confirmation/shipping/pickup notifications.
Imagine if they put their brainpower to real jobs
With hotmail/outlook, you can tighten up the security a bit, and stop the login attempts.
You can add an alias to you account, and then remove the permission to log in(dont actually remove it completely) from your original email. You will still recieve all the e-mails, and will work like normal, but your sign in will be different.
I had the exact same problem, doing this stopped all the login attempts.
There is nothing you can do about the unsuccessful logins to your email address. My original email address has been in so many hacks and it’s always being brute forced by hackers outside the US.
You already have MFA, so the only other thing I can think of is to have an incredibly long random password on your account and make sure the “forgot my password” recovery flows don’t have any easy way to bypass. Things like another email address as a backup that’s less secure, being able to guess your personal details based on past hacks, easily guessable/researchable security questions (make these random or nonsensical if possible, or don’t put details from security questions in social media) could be used to gain access, even with MFA. And finally, secure your password manager in a similar manner.
Password managers such as Bitwarden have password generators that you can use to make on the fly secure passwords (example: gnb*a&2$d9Uzej). You should ideally make the max length that the individual sites supports. Use that for every important account, especially your main email address, especially the one you use for your phone if you are on Android.
Add to this: make sure that your Bitwarden password–or passphrase–is also strong enough to resist attacks. Especially if the email account linked to it is the one that they’re trying to break into.
Hey, that’s the same code I use for my luggage!
Hail, Skroob!
Okay I’ve now switched all my passwords for all my accounts to gnb*a&2$d9Uzej
What now?
Likely that email or a previous email you clicked on was a phishing attack and when you logged in you gave them your password. And if you used that password anywhere else, you let them into those accounts as well. Make sure to check the links in emails are actually pointing to the expected web address and never click through warnings about SSL certificates being invalid. Better yet, never click on email links. Go into your web browser and type in the address manually. And use a password manager with unique, random passwords for every website and use a strong password and a 2FA method that requires access to a physical object or biometrics (cell phone text messages don’t count as a physical object). If you still have trouble then it could be that your 2FA method is compromised. If you’re using a cell phone, for example, it’s possible your neighborhood is the target of a stingray or similar device that mimics a cell tower. Turn off 2G if you can. But even then, that only eliminates a subset of the devices. Get a yubikey or use other, more secure, 2FA methods and be sure to disable the less secure 2FA methods, because you’re only as secure as the least secure one.
Like others have said, change your passwords, activate 2FA if available, never reuse passwords etc, etc, etc.
I have been getting repeated warnings for unsuccessful logins to my Microsoft account for some time now. I’m guessing some bad actors are just throwing whatever leaked passwords they have hoping for hits. I have 2FA turned on and a password complex enough to deter dictionary attacks, so I’m not really concerned.
I’ve had the same Microsoft ones for years now. At least once a week there’ll be a block of 10 - 20 of those emails. Guess they still haven’t succeeded!
Whats a dictionary attack? I’ve never heard that term before
Basically, guessing lots of passwords from a list (dictionary): https://en.wikipedia.org/wiki/Dictionary_attack
Well I feel dumb, lol it seems obvious now that you said it
Don’t feel dumb, asking questions and reading is how we learn.
After logging into Macy’s I got 43 emails at once to seven different services like “Excalidraw” and “Sportograf” trying to login using a magic link.
If you never use this kind of signin method, I’d make a rule to automatically delete those emails with the magic link so that you don’t accidentally use them.
Other than that, a secure password and 2FA are your best defenses.
I am currently using the iOS password manager. I have my qualms with it but it’s been mostly pretty solid. I was an android user for years and used a fair share of password managers, I like the iOS one the best but I know some of the new managers are much better. I don’t know any other iOS compatible password managers. I’m open to suggestions.
Also every account that uses 2FA has either an Authenticator code or email to an authentication secured email address.
bitwarden. don’t repeat passwords. setup mfa on things you haven’t already. that’s about it. new, random password for each account.
sounds like one was compromised so they’re doing a password spray on everything they can find. passwords like BD!CzuX0$Wemt2 will never be brute forced or randomly guessed, they’re usually stolen in data breaches, but if all passwords are different and not repeated, you’re doing everything you can.
“hacks” happen, you can minimize by using different passwords on each account, use bitwarden to generate and save them.
Was the password on macys randomly generated? Or do you think that could have been the same password as another website?
100%was repeated, that’s why they are spraying anything they find. most likely compromised in a breach.