My password manager told me that my info was leaked, including IP address, address, email, personal information, and phone number, in a data breach of eye4fraud.com. However, I don’t use eye4fraud, so it must have been a site that uses their services. I would like to change my login credentials on the site that shared my data with them (and stop using their service since they’re sharing my info with a security company that was breached), but I don’t know which site that was. I found this list of sites that use eye4fraud, but that list has over 1,600 entries. Other than reviewing every single sight on the list, is there a way of finding out which site that I use leaked my info?
Probably not.
The best advice I’ve heard is to use a variation of your email (assuming you use Gmail) on every site you sign up for that indicates that website. This would allow you to immediately know.
So what is a Gmail Plus address? Say you have an email address like [email protected]. If you append a “plus” sign to your email username, Gmail will ignore anything written between the + and @ sign in the email address and still deliver the message to the same mailbox.
Scammers are well aware of this trick and can easily strip out everything between the + and the @ on a huge database of email addresses. A better approach is to use Proton Pass or simplelogin, which creates a brand new email address that forwards to your real one. That way you can create a new email address for every site. Both services automatically append the site name and incluse a few random digits to the new email address. So if you want to make a new alias for your LLBean login, it’d create LLBean.gv4gk7.passmail.net which would forward all emails to your real email address.
Why would a scammer care if you figure out which 3rd party sold you out? I don’t think the risk is worth paying for another subscription.
Because after you setup the filter to remove that plus sign label, your email address is worthless without removing it.
Why would it be worthless? It’s still a valid, deliverable address to a real person (you). The only difference is the receiver knows which company sold their information AFAIK
No it’s not, because the whole point of it is so you can filter them out. Which is exactly what you do when you realize you’re getting email from someone you didn’t give that address to, and at which point it becomes worthless. But stripping out the plusses is trivial and yields an un-filterable address.
Does something similar exist aside from Gmail? Cus you know. Gmail.
You could use something like simplelogin.io to create aliases.
Integrates with password managers like Bitwarden nicely to generate aliases.
I think many other services support the + trick though too. The downside is that spammers know the + trick and can find out your base email easily; they can’t if you use an alias.
I think it’s a fairly standard feature. At least Protonmail also supports this kind of “alias”.
If I’m not mistaken it’s part of the original spec, Dylan beattle had a bit in a talk about email at some point
Edit: I was in fact mistaken it’s a Google only thing and not part of the spec
Protonmail supports + addresses as well. Not sure about others.
- Apple: https://support.apple.com/en-us/HT210425
- https://simplelogin.io/
- DuckDuckGo: https://spreadprivacy.com/protect-your-inbox-with-duckduckgo-email-protection/
- https://addy.io/
- Proton’s plus address support: https://proton.me/support/addresses-and-aliases
- Catch-all emails for a domain you own (search how to set up with your hosting provider)
- Firefox: https://relay.firefox.com/
YMMV on all of these. These are things I use or have considered.
Afaik this is not a feature unique to Gmail, it’s a feature of the email system as a whole. Same with a dot. Any characters after a plus or dot in the first part of the email are ignored.
I’m fairly certain you’re wrong about the “.” in an email address
This breaks a lot of sites that try to sanitize addresses (don’t ask me why they do it)
Had it happen a couple of times that I would register and then it wouldn’t recognize my email for the login or the confirmation email would never arrive. Never tried it again after that because it also ment I was unable to use that email for that site as well.
more than that, dots don’t matter in gmail. [email protected] is the same as [email protected], or as [email protected]. they all funnel into the id with which yiu had signed up.
this allows you to put various permutations of your email id for varioua online services.
I do this with passwords, too. For example, generate 15 digits and add 5 digits (like +LMY!) to end. Many of those sites will list which passwords were stolen, easy to see to see which sites have unforgivably poor security.
For email addresses, the variation is useful, but it’s probably inevitable that it’s eventually sold, stolen or guessed. Still nice to have the evidence.
Check your email addresses at haveibeenpwned.com and it will tell you what was all was leaked. eye4fraud was likely a fraud credentials hosting site that got hacked and leaked, and yours was in there, and it would have come from a previous leak.
It’s a “fraud prevention company” so some site you bought stuff from passed your data to them.
Oh wow with a name like eye4fraud I never would have guessed they were legitimate and widely used but it looks like you’re right.
seems like it would be easier to work from your pw manager - did it not tell you which cred was compromised?
To me it sounds like his PW manager is just one of those that give fake warnings so you think they’re doing something for you
They only said it was eye4fraud. When I looked into that site since I’ve never knowingly used them, I found out that they manage security for other sites.
You can Ctrl-F and search for services that are in your PW manager.
If you can’t find it, you can check https://haveibeenpwned.com/ for your email and password