That's there. However this gang has generally operated by downloading out of date password dumps
From: anti-abuse-wg <anti-abuse-wg-bounces@ripe.net> on behalf of Andreas Schulze <andreas.schulze@datev.de>
Sent: Wednesday, October 24, 2018 3:52 PM
To: anti-abuse-wg@ripe.net
Subject: Re: [anti-abuse-wg] Mailman
Am 22.10.2018 um 07:50 schrieb ac:
>
> Hi All,
>
> I will be repeating this post on four Mailman mailing lists....
>
> I received one of these: "I hacked your account, here is your password
> and pay me bitcoin" scam emails - to andre@ox.co.za with the password I
> used on anti-abuse-wg@ripe.net (and three other Mailman lists only...)
>
> As I use different passwords, change my passwords (up to now, except
> for mailing lists), every 7 to 30 days, I am usually able to know
> exactly where, when so that I can go look for the how, etc. As
> unfortunately I used the same email and same password on four lists, I
> do not know which list data has been compromised.
there are two places a list password is stored.
- @mailman itself
- @your-mua by regular "this is your subsription overview" messages sent out by mailman.
if you find a password that (you think) is current, what is the more likely place it was stolen?
--
A. Schulze
DATEV eG