IP list bombing is a multifaceted attack targeting email sign-ups with objectives ranging from harassment and obscuring critical messages to sabotage and content theft. Key mitigation strategies involve a layered approach, including network-level protection (like Cloudflare), confirmed opt-in, CAPTCHAs, rate limiting, honeypots, web application firewalls, email verification, and continuous monitoring. Blocking IPs alone is ineffective. Opportunistic TLS doesn't protect against active attacks, and users should report spam and manage safe sender lists. Balancing security with user experience is crucial.
11 marketer opinions
IP list bombing involves overwhelming email sign-up forms with illegitimate requests, with objectives ranging from harassment and obscuring important emails to content theft and reputational damage. Mitigation strategies include implementing double opt-in, CAPTCHAs, rate limiting, monitoring signup patterns, using email verification services, honeypot fields, and web application firewalls. Network layer protection can address a significant portion of the problem, but a multi-layered approach is often necessary.
Marketer view
Email marketer from Email Geeks responds that stacking several remedies can lead to a near-perfect solution, with network layer protection solving 95% of the problem and other methods contributing a small percentage. However, they add friction for the end-user, which should be considered.
5 Jul 2023 - Email Geeks
Marketer view
Email marketer from Formspree explains that you can implement a honeypot field in your forms. These are fields that are hidden from regular users, but are often filled in by bots. If these fields are filled out then the form submission can be automatically rejected.
9 Feb 2023 - Formspree
5 expert opinions
IP list bombing serves various malicious objectives, including harassment, obscuring important communications to facilitate crime, sabotaging a competitor's email list, and identifying vulnerabilities. While no single solution completely eliminates list bombing, mitigation strategies involve confirmed opt-in, rate limiting, CAPTCHAs, and honeypots. Blocking IPs is generally ineffective due to the dynamic nature of spammers' IP usage.
Expert view
Expert from Email Geeks explains that subscription bombing is typically used in two contexts: harassment of the target victim by adding them to numerous lists, and facilitating crime by overwhelming the victim's mailbox to hide important messages.
13 Nov 2022 - Email Geeks
Expert view
Expert from Email Geeks explains that another scenario is corporate sabotage by a competitor or a dissatisfied customer, where the goal is to mess up the list and tank the sender's reputation. Also, hackers may look for exploits by testing email addresses and seeing if they can find vulnerabilities.
22 Sep 2022 - Email Geeks
4 technical articles
Technical documentation emphasizes the use of rate limiting, CAPTCHAs, and bot detection to prevent automated attacks, including subscription bombing. Reporting spam helps improve filtering accuracy. While opportunistic TLS provides privacy against passive eavesdropping, it does not protect against active attacks. Adding safe senders to the blocked senders list reduces future spam.
Technical article
Documentation from RFC Editor defines the purpose of opportunistic TLS which to to provide privacy against passive eavesdropping. This provides no protection against active attacks. The threat model is a client communicating to server where there is no prior arrangement for security.
12 Aug 2024 - RFC Editor
Technical article
Documentation from Microsoft support explains that users should add safe senders to their blocked senders list. This provides a way to reduce future spam in a similar theme. Microsoft also explains that they work to filter out spam before it reaches your inbox.
28 Dec 2022 - Microsoft Support
How can I ensure deliverability when many signups are from qq.com addresses and what steps can I take to prevent spam signups?
How can I identify and prevent spam/bot traffic at email subscription points?
How can I identify and remove email addresses submitted via list bombing?
How can I prevent bots from signing up for my newsletter and marking it as spam?
How can I prevent non-human interaction (NHI) during email signup and confirmation?
How should I handle Abuse Feedback Reports from USGOabuse.net regarding subscription bombing?