Bitcoin Forum

Bitcoin => Bitcoin Discussion => Topic started by: Maidak on July 14, 2014, 09:02:01 PM



Title: Who else is getting the .jar email spam?
Post by: Maidak on July 14, 2014, 09:02:01 PM
I was warned by x-hash not to open these emails the other day and it seems ever since this warning i've been spammed like no other with these. Did x-hash's customer email database get leaked or something?


Title: Re: Who else is getting the .jar email spam?
Post by: Cryptopher on July 14, 2014, 09:50:47 PM
I think it's safe to say that common sense should be used when receiving attachments from either an unknown sender, or a known sender with no prior announcement - at the very least.

I'm not associated with x-hash, but since entering cryptocurrency I've been especially apprehensive about handling attachments on machine(s) that I use for any crypto-related functions.


Title: Re: Who else is getting the .jar email spam?
Post by: Maidak on July 15, 2014, 12:21:09 AM
I think it's safe to say that common sense should be used when receiving attachments from either an unknown sender, or a known sender with no prior announcement - at the very least.

I'm not associated with x-hash, but since entering cryptocurrency I've been especially apprehensive about handling attachments on machine(s) that I use for any crypto-related functions.

Of course I am just wondering where my email was leaked. Its only been recent i've been receiving these emails almost on a daily basis now.


Title: Re: Who else is getting the .jar email spam?
Post by: ff678 on July 15, 2014, 04:17:14 AM
I got at least 10 .jar emails within these week ,they are coming from different sites: btc-e,zoomhash,blockchain,x-hash,minereu,zeusminer,wemineltc,bitmaintech,bitpay.... >:(
The most creepy thing is I don't even heard some of these names!!why and how they get my address ???  ???

Is there any one who know how to stop receiving such kind of email??And how should I defend myself?

I am new here ,any experience will be very helpful,thx!!!


Title: Re: Who else is getting the .jar email spam?
Post by: RedDiamond on July 15, 2014, 07:39:22 AM
Could you list the content one of these jar-files? Just save the attachment and then open it with WinRar.
Or if you have JDK installed give command

jar tf filename.jar

in command prompt.


Title: Re: Who else is getting the .jar email spam?
Post by: Cryptopher on July 15, 2014, 07:51:56 AM
I think it's safe to say that common sense should be used when receiving attachments from either an unknown sender, or a known sender with no prior announcement - at the very least.

I'm not associated with x-hash, but since entering cryptocurrency I've been especially apprehensive about handling attachments on machine(s) that I use for any crypto-related functions.

Of course I am just wondering where my email was leaked. Its only been recent i've been receiving these emails almost on a daily basis now.

That's a fair point. The only thing that you can do is research into whether any of the sites that you use that email address on have been compromised. Of course, this topic is a bid to check x-hash, but it might be worth Googling whether any other sites you use it on have announced that they have been compromised. Reddit might be useful too.


Title: Re: Who else is getting the .jar email spam?
Post by: ff678 on July 15, 2014, 09:46:50 AM
I think it's safe to say that common sense should be used when receiving attachments from either an unknown sender, or a known sender with no prior announcement - at the very least.

I'm not associated with x-hash, but since entering cryptocurrency I've been especially apprehensive about handling attachments on machine(s) that I use for any crypto-related functions.

Of course I am just wondering where my email was leaked. Its only been recent i've been receiving these emails almost on a daily basis now.

That's a fair point. The only thing that you can do is research into whether any of the sites that you use that email address on have been compromised. Of course, this topic is a bid to check x-hash, but it might be worth Googling whether any other sites you use it on have announced that they have been compromised. Reddit might be useful too.

I never heard or used xhash before,they seems brand new in here,no background and no reference to back up.
EU and GAW looks much better.
I heard of OpenSSL "effort" Vulnerability,is this the source of all these?
http://safeweb.norton.com/heartbleed
I check with minereu and gawminer,it seems that https://minereu.com/ The existence of this vulnerability
didn't get any information about GAW.