In the event of a list bombing attack and potential account compromise, a multi-faceted approach is crucial. It begins with understanding the scope of the breach and identifying affected accounts, especially high-value ones like banking and email. Immediate actions include carefully monitoring financial accounts for suspicious activity, contacting your ESP to mitigate malicious subscriptions, and setting up fraud alerts with credit bureaus. Enhancing account security by changing passwords (except during the height of the attack), enabling two-factor authentication, and using password managers is vital. Being vigilant for phishing attempts and regularly reviewing app permissions are also key. Long-term protection involves opting out of data broker sites and adjusting privacy settings. It's important to remember the attack will likely subside in 48 hours. Further, know to report incidents to authorities like the FTC and consider identity protection services for ongoing security.
22 marketer opinions
In the event of a list bombing attack and potential account compromise, the primary focus should be on securing sensitive accounts and preventing further unauthorized access. Immediate actions include identifying the scope of the breach, changing passwords (except during the initial attack phase), enabling two-factor authentication, and monitoring financial accounts for suspicious activity. It is recommended to contact ESPs to purge malicious subscriptions, consider using a password manager with unique passwords, and be wary of phishing attempts. Additionally, measures such as placing credit freezes, opting out of data brokers, and adjusting privacy settings can help mitigate long-term risks.
Marketer view
Marketer from Email Geeks shares to reach out to the various ESPs, explain you are being added malicious to accounts/lists and ask for a purge from subscriptions for the last X timeframe.
15 Jun 2023 - Email Geeks
Marketer view
Email marketer from Reddit explains to report the incident to relevant authorities, such as the FTC or local law enforcement, especially if identity theft or financial fraud has occurred.
26 Apr 2022 - Reddit
7 expert opinions
In the event of a list bombing attack, immediate steps should be taken to mitigate the damage. It's crucial to monitor emails closely, especially those related to password resets or sensitive accounts, and to update security measures like passwords and two-factor authentication. Creating inbox rules to filter out subscription confirmation emails can help manage the volume. Contacting your ESP is important to help mitigate the attack. Although the bulk of the attack might subside within a couple of days, list bombing can negatively impact email deliverability by causing throttling or blocking by mailbox providers.
Expert view
Expert from Email Geeks shares to keep an extra close eye on emails trying to reset passwords, or access sensitive accounts like banking or other financial, along with your social accounts. possibly run a search of your inbox for terms like password reset, successful login, or other terms like this.
3 Mar 2022 - Email Geeks
Expert view
Expert from Email Geeks explains that there isn’t much you can do. One of their addresses got bombed a few years ago (targeted harassment) and most of the volume passed in 48 hours or so.
16 Aug 2022 - Email Geeks
4 technical articles
Following an account compromise, security documentation emphasizes immediate and thorough action. It's crucial to change passwords for all affected accounts, prioritizing those with shared passwords, and to enable multi-factor authentication for enhanced security. Continuous monitoring of financial accounts, credit reports, and credit card statements is essential to detect and report any unauthorized activity. Running a full system scan with anti-malware software can help remove any malicious software. Reviewing and revoking permissions granted to third-party apps connected to email and social media accounts reduces the risk of unauthorized access.
Technical article
Documentation from Federal Trade Commission advises to closely monitor bank accounts, credit card statements, and credit reports for any unauthorized activity and to report any suspicious transactions immediately.
14 Dec 2023 - Federal Trade Commission
Technical article
Documentation from CISA (Cybersecurity and Infrastructure Security Agency) recommends running a full system scan with reputable anti-malware software to detect and remove any malicious software that may have been installed during the compromise.
23 Nov 2022 - CISA
Are people still falling for email scams?
How can I identify and remove email addresses submitted via list bombing?
How can I prevent brand and sender profile impersonation in emails and what actions can I take?
How can you identify the source of unsolicited emails and prevent data leaks?
How should I handle Abuse Feedback Reports from USGOabuse.net regarding subscription bombing?
What are the objectives and mitigation strategies for IP list bombing on email sign-ups?