Essentially, a Joe Job attack happens when an attacker sends fake (spoofed) spam email that appears as though it originated from your domain. Email has always been one of the most insecure protocols on the Internet – anybody with even a minimal knowledge of technology can send email “from” whoever they want, without much effort.
Usually you become aware of such an attack when you begin receiving a flood of angry email replies to the spam (since the Reply-To address is often your own). Now begins the long arduous task of saving face amongst the onslaught of defamation. It seems daunting, but we have compiled a comprehensive guide to surviving a Joe Job attack, should you be unfortunate enough to become a victim:
1. Create firstname.lastname@example.org and email@example.com if these do not already exist. These should either be set up to forward to you, or you could configure your email client to also receive email from these addresses. This is so that information sent from SpamCop and other blacklist services is not missed. Whenever somebody submits one of the spam emails to SpamCop, real time reports will be forwarded to firstname.lastname@example.org. Fortunately, SpamCop is smart about these things and will realize that the emails are not originating from your domain.
2. Set up a spam information page with information about the attack and a form where victims can submit the header information from the offending emails to help you expedite the investigation. In cases where the attack is being carried out by a devious competitor, this will have the benefit of letting them know you’re onto them, and they need to stop. It also helps the people who are receiving the spam. They may be hearing about your company for the first time by receiving the defaming spam, and the proactive ones will almost certainly be browsing your site looking for answers. It will help immeasurably to provide them with the information they are looking for, letting them know that the email did not come from you and that there is something they can do to help end the attack. As you begin to receive more information it will also help with your own investigation. Appletree’s Joe Job information page is an excellent reference.
3. Create an alert link from your home page that directs people to the spam information page without distracting the customers who are there under normal circumstances. The point is that you need to address the issue with an official response and a way for proactive victims to do something meaningful to help stop the attack.
4. Once people begin sending you full header information thanks to step 3, you can begin doing some research to find out where the attacks are coming from. As you view the full headers, the only line which cannot be faked is the “Received” line, which usually contains the originating IP address. This may or may not be useful because a smart attacker will often bounce their emails off of several “open relay” servers, effectively hiding their original location. This information will still be very valuable to SpamCop, however, in building up a blacklist of known “open relay” servers, which will be beneficial in the long run. Make sure to create a SpamCop account and submit all of the spam emails you receive.
5. Notify your web host about what is going on. Even though the emails are not being sent from their servers, it is good for them to know what is happening. Sometimes web hosts will help with the investigation.
6. Utilize your social networks – blogs, Facebook, Twitter, etc – to send out helpful “security” reminders, while being sure not to instill fear. The people in your own network will appreciate the information even though they most likely did not receive the spam email. The spammer usually has different targets and goals, separate from your own. It is always a good idea, though, to make sure your own customers are aware of your spam policy and that you are actively on top of keeping them safe while doing online business with you.
Other than that, be very gracious and kind to the victims who complain about getting spam from your company. Being knowledgeable enough to briefly explain the nature of the problem will go a long way towards turning potentially bad press into a network of allies.
Subscribe To Our E-Newsletter
Ten Tips on How to be Successful While Working From Home Dur
As a web developer of over 15 years, I’ve spent a lot of time working remot…
How to Stay Safe Online During the COVID-19 Outbreak
The COVID-19 outbreak has taken the world by surprise. In these unprecedent…
Google Images are Not Free
Images are a great way to catch eyes on your website, social media, and eve…
- Facebook Password Reset Scam!
- Do I Need Alignable?
- Why Is It Important To Know Who Owns Your Representative? One Example: Glass-Steagall
- Help Alexa and Siri Find Your Business During Voice Search
- What’s a Twitter Storm?
- Common Email Scams to Lookout For
- There’s an App for Labor Organization
- Why Labor Unions Need Social Media
- Good WordPress Administrator Names
- Anyone pull off some good April Fool's Day pranks on their family? If not, at least share a family friendly joke with us.
- Guidelines for Cleaning Devices in the Workspace to Limit the Spread of COVID-19 | Zebra... There are so many items hands touch besides door knobs. Check out how to clean #COVID19 off your office devices without breaking them 🦠🤚🚧
- Don't get us wrong, we're thankful to still be working!
- So true!! It's going to be even harder to convince our programmers to come out of quarantine when this is all over. 😆
- Let's Encrypt Revoking 3 Million TLS Certificates Issued Incorrectly Due to a Bug A heads up for Let's Encrypt SSL Certificate users 🚧💻
- Google Images are Not Free Using images from #Google can end up costing you tons of money. 💰🚫
- Timeline Photos We're excited to say that performancefieldhouse.com is up and running.
Checking facility availability and purchasing time is easy with the online booking system we've implemented.
We've loved working with Performance FieldHouse. Go check out their new site!
- Lots of spam email have been finding their way into our main inbox recently. Be cautious before clicking a link and lookout for signs of spam.
Here is an article we did about common spam emails to watch out for:
- Happy February 14th. 😉 #ValentinesDay2020
- Easy to mix up I suppose...🤣🥞💻
#technology #TechnologyRocks #TechnologyTheseDays #technologynews #technologysolutions #technologyfail #technologyart #technologytrends #technologyr #TechnologyIsAwesome #technologysucks #technologyhatesme #technologyinnovation #technologytoenjoy #technologylover #technologyaddict #technologytuesday #technologywitch #technologyrules #technologytakeover #technologycompany #TechnologyforGood #technologyproblems #technologyeducation #TechnologyConsulting #technologyfree #technologyfacts #technologypark #technologyiscool #technologyjobs
- That's about as helpful as #AutoCorrect could ever be!
- Happy New Year! Now that the holidays are over...
#alexa #christmas2019 #newyears2019 #happynewyear #technology
- Chinese Government Holds Back Everyone’s Internet Freedom: A strong example of the problems this world... Chinese Government Holds Back Everyone’s Internet Freedom: A strong example of the problems this world faces with cyber censorship is what is going on in China. The government blocks many websites, searches, and software based on their content.
- EU-US Privacy Shield Still Not Protecting Your Privacy: Still collecting bulk data, problems with the... EU-US Privacy Shield Still Not Protecting Your Privacy: Still collecting bulk data, problems with the judicial redress act, and no true protection for businesses
- Copyright and Social Media: This has become a gray area. Almost everyone is guilty of... Copyright and Social Media: This has become a gray area. Almost everyone is guilty of sharing something on social media, whether it be Facebook, Twitter, or Pinterest, that was copyrighted and not yours to share. But what is fair to ...