Knowledge (XXG)

Joe job

Source đź“ť

43: 235:
Joe jobs often intend to capitalize on general hatred for spam. They usually forge "from" addresses and email headers so that angry replies are directed to the victim. Some joe job attacks adopt deliberately inflammatory viewpoints, intending to deceive the recipient into believing they were sent by
215:
When imitating a legitimate e-mail, the joe job will usually pose as an order confirmation. These "confirmations" may ask for credit card information, in which event the attack differs from phishing only in intent, not methodology, or simply imply that the recipient has already bought something from
199:
If the Joe-jobber is imitating a normal spam, it will simply advertise the victim's product, business or website. It may also claim that the victim is selling illegal or offensive items such as illegal drugs, automatic weapons or child pornography to increase the likelihood that the recipient will
160:
The name "Joe job" originated from such a spam attack on Joe Doll, webmaster of joes.com, in early 1997. One user's joes.com account was removed because of advertising through spam. In retaliation, the user sent new spam with headers forged to make it appear that Joe Doll was responsible. Besides
211:
scheme, the e-mail will still feature links to the victim's website or include contact information. In these instances, the joe-jobber is hoping that the recipient will notice the e-mail is fake, but mistakenly think the victim is behind the "scam".
172:
Joe-jobbers could also be businesses trying to defame a competitor or a spammer trying to harm the reputation of an anti-spam group or filtering service. Joe job attacks in other media are often motivated politically or through personal enmity.
168:
Some e-mail Joe jobs are acts of revenge like the original, whether by individuals or by organizations that also use spam for other purposes. Spammers use the technique to cycle through domains and to try to get around spam filters and blocks.
216:
the store (leading the recipient to fear their credit card has already been charged). Like the "normal spam" jobs, these e-mails will often mention illegal activities to incite the recipient to angry e-mails and legal threats.
147:
technique that sends out unsolicited e-mails using spoofed sender data. Early Joe jobs aimed at tarnishing the reputation of the apparent sender or inducing the recipients to take action against them (see also
271:
False headers are used by many viruses or spambots today, and are selected in a random or automated way, so it is possible for someone to be joe jobbed without any human intent or intervention.
152:), but they are now typically used by commercial spammers to conceal the true origin of their messages and to trick recipients into opening emails apparently coming from a trusted source. 255:
Unlike most email spam, the victim does not have to "fall for" or even receive the email in question; the perpetrator is using innocent third parties to fuel what essentially amounts to
181:
Joe jobs usually look like normal spam, although they might also disguise themselves as other types of scams or even as legitimate (but misdirected) messages.
659: 369: 699: 674: 487: 126: 361: 332: 64: 654: 536: 860: 107: 79: 694: 53: 237: 669: 566: 531: 440: 289: â€“ incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam 162: 86: 60: 504: 480: 93: 245: 241: 236:
the victim. Joe job victims may lose website hosting or network connectivity due to complaints to their
709: 679: 646: 165:, from anti-spam vigilantes who thought he had sent the mail, which temporarily took the site down. 75: 684: 526: 286: 220: 244:
costs (or server overload) due to increased website traffic. The victim may also find their email
192:
systems as well. In general, joe jobbing is seen only on messaging systems with weak or no sender
224: 184:
Joe jobbing (or "joeing") can take different forms, but most incidents involve either e-mail or
850: 664: 607: 473: 365: 280: 260: 189: 144: 355: 805: 752: 204: 417: 817: 787: 521: 429: 219:
Another joe-job variation is an e-mail claiming that the victim offers a "spam friendly"
855: 827: 797: 747: 689: 612: 602: 546: 193: 149: 844: 762: 727: 627: 561: 386: 324: 100: 465: 810: 767: 737: 587: 227:
in the hope of further inciting action against the victim by anti-spam activists.
772: 582: 249: 42: 742: 719: 592: 551: 513: 296: 455: 305: â€“ Posting a flood of articles to a Usenet group, with falsified headers 196:, or where most users will assume the purported sender to be the actual one. 777: 757: 632: 293:– A related phenomenon that is not targeted directly at a particular victim 822: 732: 617: 597: 496: 302: 208: 299: â€“ Covert operation designed to deceive, a similar military concept 704: 622: 256: 17: 410: 185: 446: 782: 541: 31: 161:
prompting angry replies, it also caused joes.com to fall prey to
469: 283: â€“ Person who incites others to commit incriminating acts 36: 451:: an instance when IBM refused to terminate the account. 30:
For the slang term for a low-level, low-paying job, see
291:
Pages displaying wikidata descriptions as a fallback
796: 718: 645: 575: 512: 503: 67:. Unsourced material may be challenged and removed. 325:"What is a Joe Job? - Definition from Techopedia" 481: 8: 509: 488: 474: 466: 27:Unsolicited email with spoofed sender data 127:Learn how and when to remove this message 411:Text of the original "joe job" spam mail 357:Anti-Spam Measures: Analysis and Design 315: 7: 65:adding citations to reliable sources 428:Thomas, Dillian (3 February 2004), 675:Distributed Checksum Clearinghouse 335:from the original on April 3, 2012 25: 660:Challenge–response spam filtering 497:Unsolicited digital communication 431:Sabotage! Coping With The Joe Job 203:When imitating a scam, such as a 200:take action against the victim. 41: 442:The Weekend IBM.NET Almost Died 362:Springer Science+Business Media 52:needs additional citations for 1: 188:. They are sometimes seen on 877: 695:Naive Bayes spam filtering 240:, and even face increased 238:Internet service providers 29: 163:denial-of-service attacks 670:Disposable email address 532:Directory harvest attack 354:Schryen, Guido (2007). 387:"Backscatter analyses" 267:Similar automated spam 156:Origin and motivation 680:Email authentication 61:improve this article 527:Bulk email software 287:Backscatter (email) 861:Online advertising 424:: recent examples. 364:. pp. 19–20. 838: 837: 665:Context filtering 641: 640: 371:978-3-540-71748-5 323:Rouse, Margaret. 281:Agent provocateur 261:denial of service 190:instant messaging 137: 136: 129: 111: 16:(Redirected from 868: 806:Advance-fee scam 753:Keyword stuffing 510: 490: 483: 476: 467: 462: 450: 445:, archived from 435: 423: 398: 397: 395: 394: 382: 376: 375: 351: 345: 344: 342: 340: 320: 292: 259:combined with a 132: 125: 121: 118: 112: 110: 69: 45: 37: 21: 876: 875: 871: 870: 869: 867: 866: 865: 841: 840: 839: 834: 818:Make Money Fast 792: 788:URL redirection 714: 637: 571: 522:Address munging 499: 494: 454: 439: 427: 415: 407: 402: 401: 392: 390: 385:Fuhrman, Cris. 384: 383: 379: 372: 353: 352: 348: 338: 336: 322: 321: 317: 312: 290: 277: 269: 233: 179: 158: 133: 122: 116: 113: 70: 68: 58: 46: 35: 28: 23: 22: 15: 12: 11: 5: 874: 872: 864: 863: 858: 853: 843: 842: 836: 835: 833: 832: 831: 830: 820: 815: 814: 813: 802: 800: 798:Internet fraud 794: 793: 791: 790: 785: 780: 775: 770: 765: 760: 755: 750: 748:Google bombing 745: 740: 735: 730: 724: 722: 716: 715: 713: 712: 707: 702: 697: 692: 690:List poisoning 687: 682: 677: 672: 667: 662: 657: 651: 649: 643: 642: 639: 638: 636: 635: 630: 625: 620: 615: 610: 605: 600: 595: 590: 585: 579: 577: 573: 572: 570: 569: 564: 559: 554: 549: 547:Email spoofing 544: 539: 534: 529: 524: 518: 516: 507: 501: 500: 495: 493: 492: 485: 478: 470: 464: 463: 452: 437: 425: 413: 406: 405:External links 403: 400: 399: 377: 370: 346: 314: 313: 311: 308: 307: 306: 300: 294: 284: 276: 273: 268: 265: 232: 229: 194:authentication 178: 175: 157: 154: 150:email spoofing 135: 134: 49: 47: 40: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 873: 862: 859: 857: 854: 852: 849: 848: 846: 829: 826: 825: 824: 821: 819: 816: 812: 809: 808: 807: 804: 803: 801: 799: 795: 789: 786: 784: 781: 779: 776: 774: 771: 769: 766: 764: 763:Referrer spam 761: 759: 756: 754: 751: 749: 746: 744: 741: 739: 736: 734: 731: 729: 726: 725: 723: 721: 717: 711: 708: 706: 703: 701: 698: 696: 693: 691: 688: 686: 683: 681: 678: 676: 673: 671: 668: 666: 663: 661: 658: 656: 653: 652: 650: 648: 644: 634: 631: 629: 628:Telemarketing 626: 624: 621: 619: 616: 614: 611: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 580: 578: 574: 568: 565: 563: 562:Pink contract 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 519: 517: 515: 511: 508: 506: 502: 498: 491: 486: 484: 479: 477: 472: 471: 468: 461: 457: 453: 449:on 2000-10-13 448: 444: 443: 438: 433: 432: 426: 421: 420: 414: 412: 409: 408: 404: 388: 381: 378: 373: 367: 363: 359: 358: 350: 347: 334: 330: 326: 319: 316: 309: 304: 301: 298: 295: 288: 285: 282: 279: 278: 274: 272: 266: 264: 262: 258: 253: 251: 247: 243: 239: 230: 228: 226: 222: 217: 213: 210: 206: 205:Nigerian scam 201: 197: 195: 191: 187: 182: 176: 174: 170: 166: 164: 155: 153: 151: 146: 142: 131: 128: 120: 109: 106: 102: 99: 95: 92: 88: 85: 81: 78: â€“  77: 73: 72:Find sources: 66: 62: 56: 55: 50:This article 48: 44: 39: 38: 33: 19: 811:Lottery scam 768:Scraper site 738:Doorway page 608:Mobile phone 588:Cold calling 556: 459: 447:the original 441: 430: 418: 416:"Joe jobs", 391:. Retrieved 389:. CA: ETSMTL 380: 356: 349: 337:. Retrieved 328: 318: 270: 254: 250:spam filters 234: 218: 214: 202: 198: 183: 180: 171: 167: 159: 140: 138: 123: 114: 104: 97: 90: 83: 71: 59:Please help 54:verification 51: 773:Social spam 685:Greylisting 655:Client-side 583:Auto dialer 434:, Sitepoint 329:Technopedia 246:blacklisted 117:August 2020 845:Categories 778:Spam blogs 743:Forum spam 720:Spamdexing 593:Flyposting 552:Image spam 514:Email spam 393:2009-04-30 310:References 297:False flag 223:or e-mail 87:newspapers 758:Link farm 728:Blog spam 647:Anti-spam 613:Newsgroup 603:Messaging 505:Protocols 456:"joe-job" 242:bandwidth 76:"Joe job" 851:Spamming 823:Phishing 733:Cloaking 710:Spamhaus 618:Robocall 598:Junk fax 460:catb.org 422:, Snopes 333:Archived 303:Sporgery 275:See also 263:attack. 231:Function 221:web host 209:phishing 145:spamming 705:SpamCop 623:Spambot 567:Spambot 557:Joe job 339:May 16, 257:slander 141:Joe job 101:scholar 18:Joe Job 419:Hoaxes 368:  225:server 186:Usenet 103:  96:  89:  82:  74:  856:Email 828:Voice 783:Sping 700:SORBS 576:Other 542:DNSWL 537:DNSBL 207:, or 143:is a 108:JSTOR 94:books 32:McJob 633:VoIP 366:ISBN 341:2023 177:Form 80:news 248:by 63:by 847:: 458:, 360:. 331:. 327:. 252:. 139:A 489:e 482:t 475:v 436:. 396:. 374:. 343:. 130:) 124:( 119:) 115:( 105:· 98:· 91:· 84:· 57:. 34:. 20:)

Index

Joe Job
McJob

verification
improve this article
adding citations to reliable sources
"Joe job"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
spamming
email spoofing
denial-of-service attacks
Usenet
instant messaging
authentication
Nigerian scam
phishing
web host
server
Internet service providers
bandwidth
blacklisted
spam filters
slander
denial of service
Agent provocateur

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑