If you or anybody uses the same
XXXXXX@whatever.com on another service, that is the likely culprit.
They are simply splitting out usernames they know exist and affixing common email domains.
I came across this thread through a spamhaus ROKSO listing
http://www.spamhaus.org/rokso/evide...le-seem-to-have-leaked-icloud-email-addresses
It seems as if we have all been getting spammed from
Daniel Alvarez, Christopher Young, and Dennis Gill. This looks like a very serious situation that affects all providers and not just the iCloud accounts.
On
http://knujon.com/ - it looks like an ip that they own is actually the
most spammed IP in the world. Judging by the number of complaints they receive; it would not shock me at all if they sent pharmacy spam. I hope Apple will further investigate these individuals to see how they acquired my email address' and others to see if in fact it was a security flaw that allowed the emails to be leaked.
Further investigation of an IP that Spamhaus has listed as under their control
http://knujon.com/ips/199.38.203.91.html shows:
cardigit.net - 258 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
aromaris.net - 257 - 7/22/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
healtelm.net - 288 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
commerpl.net - 263 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
lateknot.net - 276 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
cinequit.net - 284 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
chrislar.net - 247 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
chottler.biz - 261 - 8/9/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - ENOM
chethspe.net - 260 - 7/22/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
cheryost.net - 320 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
cubithum.net - 268 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
carrepsi.net - 294 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
danairve.biz - 284 - 8/4/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - ENOM
logitail.net - 310 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
btelyner.net - 313 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
bruynner.net - 255 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
bindarma.biz - 247 - 8/7/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - ENOM
markield.biz - 284 - 8/4/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - ENOM
matellam.com - 242 - 7/9/2013 - 9/18/2013 - FAIL - NS1.WATCH-TOWER-SYSTEMS.COM - 199.38.203.91 - ENOM
mccorerg.net - 311 - 7/30/2013 - 9/18/2013 - FAIL - NS1.TRUECENTERINC.COM - 199.38.203.91 - DYNADOT
Knujon shows that the domains are not working anymore but seems like the page directs a blank page. Perhaps a trick they use to trick knujon.com into thinking the domain has been suspended. It looks like they bounce from one registrar to another buying randomword.biz/net/com domains in order to get around the spam filters.
i'm tired of the ******** Dr. Oz spam and I hope
Daniel Alvarez, Christopher Young, and Dennis Gill and whoever else is in their gang gets put in the slammer soon.