Suped

Summary

Spammers employ various deceptive tactics to acquire content for their unsolicited emails. This often involves more than just obtaining email addresses; they also seek out and repurpose existing email campaign designs, branding elements, and even specific marketing messages. The goal is to create emails that appear legitimate enough to bypass spam filters and trick recipients into engaging with malicious links or content.

What email marketers say

Email marketers often find themselves grappling with the consequences of spammers leveraging their brand's content. This can lead to confusion among recipients and even tarnish sender reputation. Marketers observe specific patterns in how these unwanted emails appear, from unusual 'To' addresses to seemingly legitimate content from their own company, raising questions about how spammers obtain and deploy such material.

Marketer view

Marketer from Email Geeks indicates that they've been receiving a lot of emails addressed to other people (like luke@aol.com) but sent to their own Gmail account, and they've been sending them directly to junk.

06 Dec 2021 - Email Geeks

Marketer view

Marketer from Email Geeks observes a similar pattern, getting hammered at Gmail with emails for dennis@aol.com in the To: field for several weeks, suggesting an attempt to hide the true recipient.

06 Dec 2021 - Email Geeks

What the experts say

Email deliverability experts highlight that the methods spammers use to acquire content are sophisticated and often involve technical trickery beyond simple harvesting. They emphasize the importance of scrutinizing email headers and understanding advanced spam techniques like snowshoe spam. The consensus is that while it's challenging to completely stop such activities, identifying their mechanisms is crucial for defense.

Expert view

Expert from Email Geeks suggests inspecting mail headers for clues about incorrect routing, noting it is extremely uncommon for mail to be simply routed incorrectly without a reason.

06 Dec 2021 - Email Geeks

Expert view

Expert from Email Geeks explains that the spam technique involves using BCC functionality, where the recipient's address is in the RCPT TO: during the transaction, but a random address is used in the To: header.

06 Dec 2021 - Email Geeks

What the documentation says

Official documentation and security reports confirm that spammers rely on automated tools and deceptive practices to acquire both email addresses and content. These sources detail how web scraping, bot activity, and even sophisticated social engineering are employed to build their campaigns. Understanding these documented methods is essential for developing effective anti-spam measures.

Technical article

Documentation from Microsoft Security Blog states that spammers and cybercriminals use sophisticated tools to scan the web and harvest email addresses. They emphasize that if an email address is publicly posted online, it is vulnerable.

06 Aug 2010 - Microsoft Security Blog

Technical article

Documentation from TechTarget defines spambots as tools used by spammers to crawl the internet in search of email addresses, which are then compiled into distribution lists for sending unsolicited emails.

10 Jan 2024 - TechTarget

14 resources

Start improving your email deliverability today

Get started