For years, Google is offering two nice features with his gmail.com platform to gain more power of your email address. You can play with the “+” (plus) sign or “.” (dot) to create more email addresses linked to your primary one. Let’s take an example with John who’s the owner of john.doe@gmail.com. John can share the email address “john.doe+soccer@gmail.com” with his friends playing soccer or “john.doe+security@gmail.com” to register on forums talking about information security. It’s the same with dots. Google just ignore them. So “john.doe@gmail.com” is the same as “john.d.oe@gmail.com”. Many people use the “+” format to optimize the flood of email they receive every day and automatically process it / store it in separate folders. That’s nice but it can also be very useful to discover where an email address is being used.
A few days ago, Troy Hunt, the owner of haveibeenpwned.com service (if you don’t know it yet, just have a look and register!), announced that new massive dumps were in the wild for a total of ~1B passwords! The new dumps are called “Exploit.In” (593M entries) and “Anti Public Combo List” (427M entries). The sources of the leaks are not clear. I grabbed a copy of the data and searched for Google “+” email addresses.
Not surprising, I found +28K unique accounts! I extracted strings after the “+” sign and indexed everything in Splunk:
As you can see, we recognise some known online services:
- xtube (adult content)
- friendster (social network)
- filesavr (file exchange service in the cloud)
- linkedin (social network)
- bioware (gaming platform)
This does not mean that those platforms were breached (ok, LinkedIn was) but it can give some indicators…
Here is a dump of the top identified tags (with more than 3 characters to keep the list useful). You can download the complete CSV here.
| Tag | Count |
| xtube |
37 |
| spam |
18 |
| filedropper |
17 |
| daz3d |
12 |
| bioware |
11 |
| friendster |
10 |
| savage |
10 |
|
8 |
|
| eharmony |
7 |
| filesavr |
6 |
| bryce |
5 |
| savage2 |
5 |
| porn |
4 |
| precyl |
4 |
| bravenet |
3 |
| comicbookdb |
3 |
| freebie |
3 |
| freebiejeebies |
3 |
| freebies |
3 |
| hackforums |
3 |
| junk |
3 |
| kffl |
3 |
| social |
3 |
| youporn |
3 |
| 97979797 |
2 |
| brice |
2 |
| dazstudio |
2 |
| detnews |
2 |
| eharm |
2 |
| free |
2 |
| gamigo |
2 |
| hack |
2 |
| heroesofnewerth |
2 |
| itickets |
2 |
| lists |
2 |
| luther |
2 |
| paygr |
2 |
| policeauctions |
2 |
| test |
2 |
| texasmonthly |
2 |
| toddy |
2 |
| trzy |
2 |
| usercash |
2 |
| xtube2 |
2 |
[The post Identifying Sources of Leaks with the Gmail “+” Feature has been first published on /dev/random]
from Xavier

No comments:
Post a Comment