I received a notification last night that someone changed my shipping address on Macys.com and when I visited the website, there was an open order for a PS5 with delivery to a NJ address.

After logging into Macy’s I got 43 emails at once to seven different services like “Excalidraw” and “Sportograf” trying to login using a magic link.

At this point was was pretty nervous so I checked my main email security. Sure enough, there have been repeated login attempts under my account going on every few minutes for weeks.

I also saw there was an attempted login to my cellphone or home internet company.

I use 2FA, authenticators, etc. Basically what else should I be doing? Is there any way to be more preventative? I really don’t wanna chuck this email but it is possible that may be the safest recourse. I do use this email for almost 300 different accounts to various things though.

8/23 update

So I received this suspicious email as a “note to self” from Microsoft in my junk folder. It says it’s from my address but additionally says it’s an “unverified server.” I am leery of it being legit but it is oddly timed.

I’ve added the opening text of the email: “Hello pervert, I’ve sent this message from your Microsoft account.

I want to inform you about a very bad situation for you.

However, you can benefit from it, if you will act wisely.

Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, macOS and Windows. I guess, you already figured out where I’m getting at.”

I’ve received these emails in the past and nothing, but I figure it bears mentioning here cause I was legitimately in a less than secure situation a few days ago.

  • Cornflake@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    128
    arrow-down
    1
    ·
    3 months ago

    It goes without saying that you should change your passwords immediately. Do you use the same password for multiple things? If so, stop that.

        • Gregor@gregtech.eu
          link
          fedilink
          arrow-up
          3
          ·
          3 months ago

          If you pay for bitwarden or self-host the normal app can also be an authenticator, with the added ability to sync the codes.

      • Cornflake@lemmy.wtf
        link
        fedilink
        English
        arrow-up
        4
        ·
        3 months ago

        Bitwarden is awesome! I used it for like three years, but I recently moved everything to Keepass. Only thing with Keepass is having to manage your own backups

        • thermal_shock@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          edit-2
          3 months ago

          why did you change? bitwarden is the best, what benefit did you gain? also sounds way cooler than keepass

          • Cornflake@lemmy.wtf
            link
            fedilink
            English
            arrow-up
            5
            arrow-down
            1
            ·
            3 months ago

            Bitwarden is great because they’re convenient. However, I figure that becoming self-reliant on maintaining my own password database wouldn’t be a bad idea. I believe storing everything locally gives me just a tad more security in case something were to happen with Bitwarden.

              • Cornflake@lemmy.wtf
                link
                fedilink
                English
                arrow-up
                2
                ·
                3 months ago

                I’ve not got the knowhow to do that. I’m also not in charge of the family router so I haven’t got the permissions to really manage my own server anyway. Someday I’ll have my own place and I’ll probably put something together but I’m pretty satisfied with Keepass :)

                • Gregor@gregtech.eu
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  3 months ago

                  Makes sense, if you ever need help with self hosting you can DM me on Matrix. The address is on my profile description.

        • Gregor@gregtech.eu
          link
          fedilink
          arrow-up
          3
          arrow-down
          1
          ·
          3 months ago

          Why did you move to KeePass? I host my own vaultwarden instance for myself and my friends.

          • Cornflake@lemmy.wtf
            link
            fedilink
            English
            arrow-up
            4
            ·
            3 months ago

            I wanted to try something new and I also figure it’s a bit more future-proof in case Bitwarden ever decides to change their pricing models such that the free tier loses any features.

            I’m sure self-hosting your password manager gives you some awesome bonuses but I don’t have the knowhow nor do I have control over the family internet router so I don’t think I can work that out just yet.

  • TheBest@midwest.social
    link
    fedilink
    English
    arrow-up
    91
    ·
    edit-2
    3 months ago

    To add on, it sounds like you were phished. No shame, it happens to everyone. The best course of action when you get an email like that, DONT click the easy to press recover account button in the email. Always go directly to the site, even if the email looks legit.

    From there you entered your password into, what im assuming, was a fake Macys website, where you gave the bad actors the exact info they needed to really activate it.

  • Euphorazine@lemmy.world
    link
    fedilink
    arrow-up
    49
    ·
    3 months ago

    To add on to everyone else mentioning it, another benefit to password managers is that they auto filter themselves to the URL. So if you have a password saved for macys.com and get phished to macys-passwordreovery.com, the password manager won’t know the URL and offer no filtering. Adding the extra step of having to manually find your password entry should be a flag itself that something might be wrong.

  • SavvyWolf@pawb.social
    link
    fedilink
    English
    arrow-up
    35
    ·
    3 months ago

    Firstly, probably remove the address from the OP. Don’t want any Lemmy vigilantes getting involved and making a mess of things.

    If you have 2fa enabled, you should be good. Even if they do guess your password, they shouldn’t* be able to log in to your account. Although might still be worth making sure you have a nice strong password anyway. Also, if you have recovery phone numbers or email addresses attached to your email account, make sure they’re secured as well.

    * Assuming that your webmail provider is doing everything correctly, which isn’t always a given if they’re a small one.

      • SavvyWolf@pawb.social
        link
        fedilink
        English
        arrow-up
        29
        ·
        3 months ago

        You’re assuming that the attacker is using their own IP rather than a compromised system owned by someone else.

        Likewise, they might be using someone else’s address with the intent to steal a package from their porch or something.

        It’d be rather silly for a theif to use their own details.

      • brbposting
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 months ago

        These losers train each other to try to remote desktop into victims’ machines.

    • otp
      link
      fedilink
      arrow-up
      8
      ·
      3 months ago

      OP probably also needs to secure their mobile account, since the attacker could redirect recovery or MFA SMSs to their own number.

  • Cyborganism@lemmy.ca
    link
    fedilink
    arrow-up
    30
    arrow-down
    1
    ·
    3 months ago

    Check if your email service has an option to log off from all devices first. This will close any active sessions and prevent anyone that might be already logged in to do anything without logging in again.

    Then change your password.

    If you have 2FA, try to use something like an authenticator app instead of a cell phone number to receive an SMS message. Sim cards can be cloned. Authenticator apps can’t.

    • some_guy@lemmy.sdf.org
      link
      fedilink
      arrow-up
      2
      ·
      3 months ago

      It’s worth noting that the option to log out all devices sometimes doesn’t happen immediately. Microsoft’s 365, for example, isn’t immediate for all devices. If a massive player doesn’t behave the way a user might expect, that’s indicative of how chaotic the landscape can be. Good luck!

  • chiliedogg@lemmy.world
    link
    fedilink
    arrow-up
    25
    ·
    edit-2
    3 months ago

    Are you also getting a bunch of random “confirm your email address” or thank you for signing up" emails?

    This sounds like it may be part of a registration bomb attack. I woke up to over 4,000 similar messages a little while back. What they were doing is hiding their actual activity by flooding my inbox. Among the thousands of emails was a notification about the new user added to my PayPal account that had been compromised. That user was trying to empty my bank account.

    I caught it before any damage could be done, and the registration bomb ended shortly afterwards.

    • Gointhefridge@lemm.eeOP
      link
      fedilink
      arrow-up
      5
      ·
      3 months ago

      Actually that did happen at the same time now that you mention it. I managed to catch it quick though. It did happen shortly after midnight. Luckily I’m a night owl and was awake.

      • chiliedogg@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        3 months ago

        It was in the first couple hundred, and I was being selective in what I read. Newsletter and verification emails could be safely ignored, while services I actually have that are attached to my bank accounts get a closer look.

  • OrgunDonor@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    3 months ago

    With hotmail/outlook, you can tighten up the security a bit, and stop the login attempts.

    You can add an alias to you account, and then remove the permission to log in(dont actually remove it completely) from your original email. You will still recieve all the e-mails, and will work like normal, but your sign in will be different.

    https://support.microsoft.com/en-us/office/add-or-remove-an-email-alias-in-outlook-com-459b1989-356d-40fa-a689-8f285b13f1f2

  • brbposting
    link
    fedilink
    English
    arrow-up
    16
    ·
    3 months ago

    May not apply here but

    Note sometimes fraudsters use email bombing when they place orders on an account of yours. They want you to miss the order confirmation/shipping/pickup notifications.

    Imagine if they put their brainpower to real jobs

  • jemikwa@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    edit-2
    3 months ago

    There is nothing you can do about the unsuccessful logins to your email address. My original email address has been in so many hacks and it’s always being brute forced by hackers outside the US.

    You already have MFA, so the only other thing I can think of is to have an incredibly long random password on your account and make sure the “forgot my password” recovery flows don’t have any easy way to bypass. Things like another email address as a backup that’s less secure, being able to guess your personal details based on past hacks, easily guessable/researchable security questions (make these random or nonsensical if possible, or don’t put details from security questions in social media) could be used to gain access, even with MFA. And finally, secure your password manager in a similar manner.

  • DarkThoughts@fedia.io
    link
    fedilink
    arrow-up
    9
    arrow-down
    1
    ·
    3 months ago

    Password managers such as Bitwarden have password generators that you can use to make on the fly secure passwords (example: gnb*a&2$d9Uzej). You should ideally make the max length that the individual sites supports. Use that for every important account, especially your main email address, especially the one you use for your phone if you are on Android.

  • irotsoma@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    3 months ago

    Likely that email or a previous email you clicked on was a phishing attack and when you logged in you gave them your password. And if you used that password anywhere else, you let them into those accounts as well. Make sure to check the links in emails are actually pointing to the expected web address and never click through warnings about SSL certificates being invalid. Better yet, never click on email links. Go into your web browser and type in the address manually. And use a password manager with unique, random passwords for every website and use a strong password and a 2FA method that requires access to a physical object or biometrics (cell phone text messages don’t count as a physical object). If you still have trouble then it could be that your 2FA method is compromised. If you’re using a cell phone, for example, it’s possible your neighborhood is the target of a stingray or similar device that mimics a cell tower. Turn off 2G if you can. But even then, that only eliminates a subset of the devices. Get a yubikey or use other, more secure, 2FA methods and be sure to disable the less secure 2FA methods, because you’re only as secure as the least secure one.

  • Dem Bosain@midwest.social
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 months ago

    Like others have said, change your passwords, activate 2FA if available, never reuse passwords etc, etc, etc.

    I have been getting repeated warnings for unsuccessful logins to my Microsoft account for some time now. I’m guessing some bad actors are just throwing whatever leaked passwords they have hoping for hits. I have 2FA turned on and a password complex enough to deter dictionary attacks, so I’m not really concerned.

  • m-p{3}@lemmy.ca
    link
    fedilink
    arrow-up
    4
    ·
    3 months ago

    After logging into Macy’s I got 43 emails at once to seven different services like “Excalidraw” and “Sportograf” trying to login using a magic link.

    If you never use this kind of signin method, I’d make a rule to automatically delete those emails with the magic link so that you don’t accidentally use them.

    Other than that, a secure password and 2FA are your best defenses.

  • Gointhefridge@lemm.eeOP
    link
    fedilink
    arrow-up
    4
    ·
    3 months ago

    I am currently using the iOS password manager. I have my qualms with it but it’s been mostly pretty solid. I was an android user for years and used a fair share of password managers, I like the iOS one the best but I know some of the new managers are much better. I don’t know any other iOS compatible password managers. I’m open to suggestions.

    Also every account that uses 2FA has either an Authenticator code or email to an authentication secured email address.

    • thermal_shock@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 months ago

      bitwarden. don’t repeat passwords. setup mfa on things you haven’t already. that’s about it. new, random password for each account.

      sounds like one was compromised so they’re doing a password spray on everything they can find. passwords like BD!CzuX0$Wemt2 will never be brute forced or randomly guessed, they’re usually stolen in data breaches, but if all passwords are different and not repeated, you’re doing everything you can.

      “hacks” happen, you can minimize by using different passwords on each account, use bitwarden to generate and save them.

    • x00z@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 months ago

      Was the password on macys randomly generated? Or do you think that could have been the same password as another website?

      • thermal_shock@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 months ago

        100%was repeated, that’s why they are spraying anything they find. most likely compromised in a breach.