my account is being spoofed

Posted on 2011-02-19
Last Modified: 2012-05-11
I have a yahoo account. apparently everyone in my address book is receiving a viagra email. How can I stop this?
Question by:al4629740
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 14

Accepted Solution

svgmuc earned 250 total points
ID: 34933541
Change the password.

Email accounts are "hacked" on a regular basis. Once they found out your password, an automated system (botnet) sends emails from your account.

I have had my yahoo account for a while and never received any complaints about me sending spam. I presume, they can only break easy passwords with word lists.
LVL 31

Assisted Solution

moorhouselondon earned 250 total points
ID: 34934286
As svgmuc says, but change it to something really really secure, letters and digits and no, PA55W0RD is too easy lol.  Yahoo allows access to account logins through an API, which makes dictionary hacking so much easier.  Yahoo don't seem to monitor failed logins through this route, otherwise this would never happen.

Check also that the hackers have not changed your "Secret Questions".  One of my clients got hacked and they changed the first of her secret questions, luckily she had a second question which was left untouched.

Put yourself in your address list so that you are among the first to know that you are in the business of promoting the benefits of viagra(tm).
LVL 34

Expert Comment

ID: 34947861
There is no way to stop anyone from sending E-Mail claiming to be from you.

Welcome to the Internet.
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.


Author Comment

ID: 34947884
what about the previous two posts, mr. psicop.
LVL 34

Expert Comment

ID: 34947923
Is the E-Mail actually being sent from your Yahell! account, or is it simply being sent with headers that claim to be from your account?
LVL 34

Expert Comment

ID: 34947932
There's nothing you can do to prevent someone from sending an E-mail claiming to be from you, but which is actually sent from elsewhere.

If someone is actually accessing your Yahell! account, then that's a horse of a different technicolor. You need to state precisely what is happening.

Author Comment

ID: 34947959
not sure, I guess thats why I'm asking for your opinions
LVL 34

Expert Comment

ID: 34948021
There's no way for us to know which is happening.

If you have a sample of the E-Mail, with complete headers, you can post it here, after obscuring your E-mail address and anything else that tends to personally identify you (and don't bother with the body of the E-Mail, it's the headers that are important).

But short of that, we have no way of knowing which is happening to you.
LVL 46

Expert Comment

by:Craig Beck
ID: 34965634
Ask someone in your address book to forward a copy of the mail headers to you, then post them on here.

This will tell you all kinds of info... what email address the email claimed to be from, the IP address of the computer that sent the mail, the relay it used to get to the recipient, the time it was sent, etc...

Unfortunately there is no easy way to stop this, as some mail servers don't use SPAM filters or blacklists.  Traditional email was checked on the basis that all mail was legitimate unless the mail server receiving the mail could provide a valid reason why it should be blocked (using blacklists, spam filters, etc.)

More recently some email providers use technologies such as SPF to make the sender prove that the mail is legitimate.

Author Comment

ID: 35023348
here is the header

Return-path: <>
Envelope-to: xxxxxxxxxxxxxxxxxx
Delivery-date: Sat, 19 Feb 2011 04:49:46 -0500
Received: from ([]
	by with esmtp (Exim)
	id 1PqjRi-0005mM-Pn
	for; Sat, 19 Feb 2011 04:49:46 -0500
Received: from ([])
	by with NO UCE
	id 9lpm1g02C0spQVs03lpmc9; Sat, 19 Feb 2011 04:49:46 -0500
X-EN-IMPSID: 9lpm1g02C0spQVs03lpmc9
Received: from ( [])
	by (8.14.1/8.14.1) with ESMTP id p1J9iQ3u007176;
	Sat, 19 Feb 2011 04:44:26 -0500
Received: from
	by  (mail_out_v42.9.) id 9.ce5.74e3415d (43837);
	Sat, 19 Feb 2011 04:44:21 -0500 (EST)
Received: from ( []) by (v129.9) with ESMTP id MAILCIADC032-b3104d5f90f31b4; Sat, 19 Feb 2011 04:44:21 -0500
Received: from TSTMAIL-D01 ( []) by (v129.9) with ESMTP id MAILSMTPRLYME038-b3104d5f90f31b4; Sat, 19 Feb 2011 04:44:19 -0500
To:,,,,, xxxxxxxxxxxxxxxx
Content-Transfer-Encoding: quoted-printable
Subject: holla
Date: Sat, 19 Feb 2011 04:44:19 -0500
X-MB-Message-Source: WebUI
X-MB-Message-Type: User
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
X-Mailer: AOL Webmail 33222-MOBILE
Received: from by ( with HTTP (WebMailUI); Sat, 19 Feb 2011 04:44:19 -0500
Message-Id: <>
X-Antivirus: avast! (VPS 110219-2, 02/19/2011), Inbound message
X-Antivirus-Status: Clean

Open in new window


Author Closing Comment

ID: 35098994

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
In this video we show how to create a Shared Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Sha…
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question