The Return of POP3: When Hackers Time-Travel to Steal Your Passwords!

Spotted in the wild: a blast from the past! The username “pop3user” is making a comeback in telnet/ssh logs. While the world has moved on to IMAP and webmail, one persistent hacker is betting on someone still clinging to POP3. The IP culprit? Part of AS47890, a network aptly managed by “Unmanaged.”

Pro Dashboard

Hot Take:

Whoa, talk about a blast from the past! The “pop3user” username is making a comeback like bell-bottom jeans, and it looks like cyber attackers are trying to party like it’s 1999. Apparently, they’re banking on someone still using POP3 to retrieve emails, which is about as likely as finding a rotary phone in the wild. But hey, kudos to them for bringing retro back, one hack attempt at a time! It’s also amusing to find this exuberantly unmanaged network, managed by a company that seems to be taking its name a bit too literally. If only their humor matched their network security prowess!

Key Points:

  • The “pop3user” username is being targeted in recent telnet/SSH logs.
  • Classic passwords like “pop3user” and “123456” are being attempted.
  • IP address 193.32.162.157 is responsible for the scanning activity.
  • The IP is part of AS47890, managed by a supposedly unmanaged network.
  • The network’s website is as blank as your mind during a pop quiz.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?