KIM KOMANDO

Use this fast, free check to see if your email address is spreading spam

Nov 2, 2020, 4:05 AM | Updated: 9:27 am

(Pexels Photo)...

(Pexels Photo)

(Pexels Photo)

Email phishing started back in the ’90s, and it’s been downhill from there. Open up the junk folder in your inbox to see what I mean. Just don’t click anything.

Think you’re tech smart? Tap or click here to take a quick phishing quiz.

You need to make sure your system is protected. This way, your network is locked down, and you can browse with the confidence your data isn’t at risk. Here are five free security downloads every computer needs.

What if you’re sending out junk email? You might be. It’s the way some of the cleverest forms of malware spread by hijacking your email address to do their dirty work.

Luckily, there’s an easy way to check whether your email or domain has been used behind your back.

Is your email address spamming people?

The Emotet botnet is one of the most effective email malware campaigns around. It started as a banking Trojan and now spreads primarily through phishing emails that lead the recipient to a malicious URL.

If there’s a spam operation using your email address, there’s a good chance it’s this one. The Russian cybercrime operation uses sophisticated tactics like replying to an old email thread to look more believable.

To know if Emotet is working behind the scenes using your account, I found a free tool you can use: haveIbeenEMOTET.

A quick note in case you’re thinking, “Hey, that sounds familiar.” The site name may sound similar to site HaveIBeenPwned, but there’s no affiliation. HaveIBeenPwned is another excellent free tool that tells you whether your data has been exposed in a data breach or sold on the dark web.

Tap or click here to listen to my podcast with the site’s creator, Troy Hunt. He operates the web’s biggest database of hacked logins.

Here’s how to check

Once you visit haveIbeenEMOTET, give your email address or domain name site and hit enter.

You’ll get one of a few results: Confirmation that your email address has not been used in an Emotet spam campaign or verification that it has.

If your email address or domain has been used, it will be marked as either “Sender Fake,” “Sender Real” or “Recipient.”

If you get one of the latter results, you need to take steps to repair the possible damage.

What to do if your email has been hijacked

The haveIbeenEMOTET site doesn’t retain any information about your email address or domain that you input. It simply checks your info against the data it has in its database. It doesn’t use cookies to track you, either.

If your email address is in the haveIbeenEMOTET database, you need to take four steps right away.

1. Scan your computer for malware. Be aware, though, that malware can interfere with your antivirus software, so you may have to boot up in Safe Mode and rerun the antivirus software if that happens. Need help finding a good antivirus program? Tap or click here to see a comparison of the popular options.

2. Change your email password. Make sure you’re using unique, hard to crack passwords for all of your online accounts. Tap or click here for tips on creating stronger passwords.

3. Check your email account to make sure your privacy and security settings are locked down. Tap or click here to secure your emails by tweaking a few settings.

4. Back up your devices. You may have to wipe your devices, and you need a solid backup in place before you do. Tap or click here for the steps pros use, including the 3-2-1 rule.

How can you avoid Emotet in the first place?

These scam emails can outsmart you if you’re not taking a good hard look at what comes through your in-box. Here are a few things to keep in mind.

● Avoid opening emails from unknown senders. Always check the URLs and sender fields closely — especially if the message appears to come from somebody you know.
● Look for a shift in tone or writing style if you get an email from someone you know. He or she might not be the one who wrote it.
● Be wary of attachments you didn’t ask for or weren’t expecting. If you get a spreadsheet or Word doc from a colleague or business associate, reach out through another medium (like a text or phone call) to double-check everything is on the up and up.
● Think twice before you click links in emails. Hover your mouse over the link to see where it will lead you.
● Enable two-factor authentication for any account that supports it. Tap or click here to see how to set up 2FA for your frequently used online accounts.

What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station. You can listen to or watch The Kim Komando Show on your phone, tablet, television or computer. Or tap or click here for Kim’s free podcasts.

Kim Komando

politics and elections...

Kim Komando

Election fraud alert: Steps to safeguard your vote

Whenever politics and elections are in the news, fraudsters come crawling out of the woodwork to turn public fears into theft opportunities.

4 days ago

If family videos are on VHS, keeping them can be a pain. Even worse, every year that goes by, those...

Kim Komando

Do this thing with your family videos before it’s too late

I cleaned out a cabinet a few years ago and found a stack of old Super 8 tapes. I’ll never forget the way Mom’s face lit up after I digitized videos of her late brother Harold Jr.’s wedding. Tragically, he died in a car accident a week after his wedding day. Memories like those are […]

11 days ago

A person writing a to-do list....

Kim Komando

3 checks you should do once a year

Here are three important tasks Kim Komando does that she said people should add to their to-do list once a year.

18 days ago

An Optus public service message is displayed inside an Optus store in Sydney, Australia. 2024 has b...

Kim Komando

Here’s a look at the biggest data breaches of 2024 and how you can protect yourself

Here's a look at the biggest data breaches of 2024 and what consumers can do to protect themselves from the fallout.

25 days ago

Kim Komando has an explainer on how to delete apps that might violate your privacy. (Pexels photo)...

Kim Komando

Here’s how to get rid of useless apps from your phone

Some apps have access to a lot of your personal data, and Kim Komando is here to explain how to get rid of ones you don't want anymore.

1 month ago

AI tech tools and tricks from Kim Komando...

Kim Komando

Exciting AI tools and games you can try for free

Some AI tech is kind of freaky, but many of the new AI tools out there are just plain fun. These free tools will help you create.

2 months ago

Sponsored Articles

...

DAY & NIGHT AIR CONDITIONING, HEATING AND PLUMBING

It wouldn’t hurt to get your AC checked after Arizona’s excruciating heat wave

A well-maintained air conditioning unit is vital to living a comfortable life inside, away from triple-digit heat in Arizona.

...

Sanderson Ford

3 new rides for 3 new road trips in Arizona

It's time for the Sanderson Ford Memorial Day sale with the Mighty Fine 69 Anniversary, as Sanderson Ford turned 69 years old in May.

...

Condor Airlines

Condor Airlines can get you smoothly from Phoenix to Frankfurt on new A330-900neo airplane

Adventure Awaits! And there's no better way to experience the vacation of your dreams than traveling with Condor Airlines.

Use this fast, free check to see if your email address is spreading spam