Spammers employ diverse tactics to acquire content for spam, ranging from technical exploits to social engineering. They scrape websites, social media, and newsletters using bots and web crawlers. They steal data through breaches, phishing, malware, and compromised accounts, gaining access to email lists, personal information, and email content. They also exploit vulnerabilities in APIs and use methods like BCC manipulation, session hijacking, and cross-site scripting. Address harvesting and recycling old content from legitimate campaigns are also common. This stolen or scraped content is then used to personalize spam, mimic legitimate communications, and bypass spam filters.
9 marketer opinions
Spammers employ various methods to obtain content for their spam emails, including scraping websites and social media, purchasing outdated email lists, exploiting data breaches, and recycling content from legitimate email marketing campaigns. They also use techniques like hidden images, tracking pixels, and web crawlers to gather information and tailor their spam messages.
Marketer view
Email marketer from Warrior Forum explains that spammers utilize web crawlers to index and copy content from websites, which is then repurposed and used in spam emails.
2 Nov 2024 - Warrior Forum
Marketer view
Email marketer from Reddit explains that spammers often recycle old content from legitimate email marketing campaigns by scraping the content and resending it.
29 Sep 2022 - Reddit
4 expert opinions
Spammers employ various techniques to obtain content for their malicious emails. These include exploiting BCC functionality, scraping social media profiles for personal data, and compromising legitimate email accounts through phishing, malware, or data breaches. They then use this stolen or scraped content to craft targeted spam messages, often mimicking legitimate communications or personalizing the spam to increase its effectiveness.
Expert view
Expert from Email Geeks explains that spammers use BCC functionality by connecting to systems and putting addresses in the RCPT TO during the transaction, but use a random address in the To: header when sending DATA.
8 Sep 2021 - Email Geeks
Expert view
Expert from Spam Resource shares that spammers gain access to legitimate email accounts through phishing scams, malware, or data breaches. Once inside, they can extract content from past emails, contact lists, and documents to craft personalized spam messages that are more likely to bypass spam filters and deceive recipients.
20 Jan 2023 - Spam Resource
5 technical articles
Spammers employ a range of technical methods to acquire content for spam campaigns. They utilize botnets to infiltrate networks and steal proprietary content, leverage phishing to obtain user credentials and access accounts, and employ address harvesting techniques to gather email addresses. Additionally, spammers exploit API vulnerabilities and use methods such as session hijacking and cross-site scripting (XSS) to compromise user accounts and extract content from online services.
Technical article
Documentation from Spamhaus answers that spammers leverage botnets (networks of compromised computers) to send spam, and that these botnets can also be used to infiltrate networks and steal proprietary content for spam campaigns.
23 Mar 2022 - Spamhaus
Technical article
Documentation from IETF shares that spammers employ address harvesting techniques, which involve using automated programs to scan web pages and other online sources for email addresses, which are then used to send spam.
21 May 2022 - IETF
Are people still falling for email scams?
Can a competitor damage my domain reputation by sending spam with links to my site?
Can a competitor damage my domain reputation by sending spam with my URL?
How are bad actors using Google Forms to send spam?
How can email senders and users prevent and identify phishing emails?
How can I identify and prevent spam/bot traffic at email subscription points?
How can I prevent brand and sender profile impersonation in emails and what actions can I take?
How can spammers send emails from real addresses, and is this a DMARC configuration issue?
How can you identify spammers?
What are common causes of email deliverability problems with Outlook.com?
Why am I getting a lot of strange signups to my newsletter?