frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Subscription bombing and how to mitigate it

https://bytemash.net/posts/subscription-bombing-your-signup-form-is-a-weapon/
38•homelessdino•1h ago

Comments

linolevan•56m ago
Well written piece on an attack vector I'd never thought too hard about before. Thanks for elaborating on why sending an email or two to a random person helps an attacker achieve their goal. A lot of similar articles skip over details like that.
cuu508•50m ago
> If a bot creates an account with someone else’s email, the victim gets one email, if they ignore it that’s the end of it. The welcome email and everything after it only fires once the user verifies.

As a user, I would prefer no welcome email at all.

devmor•39m ago
Then there's no verification step, preventing the entire mechanism of you not getting spammed.
JoshTriplett•26m ago
It sounds like cuu508 didn't want the post-verification welcome, as opposed to the one-time verification message.
cuu508•21m ago
Correct.
sodapopcan•9m ago
Yes, correct. When I clicked the link I was already welcomed by the welcome page (which is, for the most part, welcomed). But then why send me another email further welcoming me? I already feel welcomed! And don't give me any of that "because it works" BS (even though that is what you are going to say).

(cuu508, "you" in this instance does not mean you)

m132•40m ago
It's a problem, but I really dislike the solution. Putting a website with known security issues behind Cloudflare's Turnstile is comparable to enforcing code signing—works until it doesn't, and in the meantime, helps centralize power around a single legal entitiy while pissing legitimate users off.

The Internet was carefully designed to withstand a nuclear war and this approach, being adopted en masse, is slowly turning it into a shadow of its former self. And despite the us-east1 and multiple Cloudflare outages of last year, we continue to stay blind to this or even rationalize it as a good thing, because that way if we're down, then so are our competitors...

AussieWog93•30m ago
Honestly I really like CloudFlare as a business. There's no vendor lock-in, just a genuine good product.

If they turn around later and do something evil, literally all I need to do is change the nameserver to a competitor and the users of my website won't even notice.

stingraycharles•27m ago
So your solution would be to do nothing?

Cloudflare is an excellent solution for many things. The internet was designed to withstand a nuclear war, but it also wasn’t designed for the level of hostility that goes on on the internet these days.

colesantiago•17m ago
And your solution is assume everyone on the internet is a good actor?

How would you solve this at scale?

cuu508•8m ago
How about a signup flow where the user sends the first email? They send an email to signups@example.com (or to a generated unique asdress), and receive a one-time sign-in link in the reply. The service would have to be careful not to process spoofed emails though.
mads_quist•36m ago
A good old Honey Pot helped us at All Quiet "a lot" with those attacks. Basically all attacks are remediated by this. No need for Cloudflare etc.
grey-area•35m ago
Can you expand on that? A separate honey pot sign up page invisible to real users, or something else?
mads_quist•32m ago
You add "hidden" inputs to your HTML form that are named like "First Name" or "Family Name". Bots will fill them out. You will either expect them to be empty or you fill by JavaScript with sth you expect. It's of course reverse-engineerable, but does the trick.
grey-area•23m ago
Thanks, I’ve seen scripted attacks bypass this sort of hidden input unfortunately (perhaps human assisted or perhaps just ignoring hidden fields).
mads_quist•17m ago
Sure, it's really basic of course.
alexjurkiewicz•20m ago
Doesn't that break password manager autofill?
queenkjuul•36m ago
I had my email stolen in such an attack, i still get random "you abandoned your cart!" Emails now and then, but luckily (?) they got my credit card at the same time and i cancelled it within minutes. So it's a little annoyance, but it doesn't really make sense to me that the flood works. At least not with American credit cards that are routinely flagging my own trips to microcenter lol

Editing to add: almost 100% of these emails came from the same e-commerce product, I'll have to look up which. But every site i got an email from was running the same off the shelf template.

tariky•27m ago
I had similar situation on WooCommerce shop. But it was much more signups per hour. Putting turnstile in front fixed problem.

My conclusion is to move from WordPress software as fast as possible, every WordPress site I manage gets bombarded by bots.

nubg•27m ago
This post was written by AI, there are multiple clues.

Author, why can you not use your own words?

I am not sure what you meant to say, vs what is LLM garbage I could have prompted myself.

wdutch•19m ago
I can't comment on if it was written by AI or not but I found the OP informative and quite dense with useful information. Nothing stood out to me as garbage.
nubg•2m ago
I agree the topic and most of the content is legit!

Which makes is even more annoying. Because you don't know which are the good bits where somebody is sharing his unique insight, and which is just taken from the LLMs world knowledge.

denismi•3m ago
[delayed]
znnajdla•16m ago
I absolutely refuse to use BigTech gatekeepers or useless CAPTCHAS (any sufficiently advanced bot can get around any CAPTCHA anyway). We solved this at our startup by running names through a simple LLM filter - if the name is gibberish like Px2846skxojw just block the signup. Worked surprisingly well. Of course this is easy to get around if the bot knows what you’re doing. But bots look for easy targets, as long as there are enough vibe coded crap targets on the internet they’re not going to bother with circumventing a carefully designed app.
mads_quist•15m ago
Nice.
tholm•2m ago
Using an LLM for this seems excessive when there are well established algorithms for detecting high entropy strings.
HexDecOctBin•10m ago
I was attacked in this way a couple of months back. I use a different email address for each account (of the pattern product@example.com), and use a separate address for Git commits (like git@example.com). It was this second one that was attacked and I ended up with some 500 emails within 12 hours. Fortunately, since I don't expect anyone to actually email me on the Git address, I just put up a filter to send them all to a separate folder to go over at leisure.

After 12 hours, the pace of emails came to a halt, and then I started receiving emails to made up addresses of a American political nature on the same domain (I have wildcard alias enabled), suggesting that someone was perhaps trying to vent some frustration. This only lasted for about half an hour before the attacked seems to have given up and stopped.

Strangely, I didn't receive any email during the attack which the attacker might have been trying to hide. Which has left me confused at to the purpose of this attack in the first place.

pqdbr•6m ago
Recently we suffered a different kind of subscription bombing: a hacker using our 'change credit card' form to 'clean' a list of thousands credit cards to see which ones would go through and approve transactions.

He ran the attack from midnight to 7AM, so there were no humans watching.

IPs were rotated on every single request, so no rate limiter caught it.

We had Cloudflare Turnstile installed in both the sign up form and in all credit card forms. All requests were validated by Turnstile.

We were running with the 'invisble' setting, and switched back to the 'recommended' setting after the incident, so I don't know if this less strict setting was to blame.

Just like OP, our website - to avoid the extra hassle on users - did not require e-mail validation, specially because we send very few e-mails.

We never thought this could bite us this way.

Every CC he tried was charged $1 as confirmation that the CC was valid, and then immediately refunded, erroring out if the CC did not approve this $1 transaction, and that's what he used. 10% of the ~2k requests went through.

Simply adding confirmation e-mail won't cut it: the hacker used - even tough he did not need it - disposable e-mail addresses services.

This is a big deal. Payment processors can ban you for allowing this to happen.

msephton•2m ago
How can an affected user recover from such an attack?

Will AI Eventually Thrive Outside the Moat?

https://www.unite.ai/will-ai-eventually-thrive-outside-the-moat/
3•50kIters•15m ago•0 comments

LipoVive – Your Daily Boost for Metabolism and Wellness 2026

https://www.morningstar.com/news/accesswire/1138075msn/lipovive-reviews-shocking-2026-report-what...
1•JulieMorrison•16m ago•0 comments

r/programming bans all discussion of LLM programming

https://old.reddit.com/r/programming/comments/1s9jkzi/announcement_temporary_llm_content_ban/
16•cryptoz•17m ago•4 comments

LFM2.5-350M

https://twitter.com/liquidai/status/2039029358224871605
1•tosh•24m ago•0 comments

Why Are Event-Driven Systems Hard?

https://newsletter.scalablethread.com/p/why-event-driven-systems-are-hard
1•fagnerbrack•26m ago•0 comments

Show HN: An SSR Java framework for real-time user interfaces and AI agents

https://github.com/vadimv/server-components
1•v4d1mv•32m ago•0 comments

Ask vs. Guess Culture

https://jeanhsu.substack.com/p/ask-vs-guess-culture
1•computomatic•32m ago•0 comments

Things I Think I Think... Preferring Local OSS LLMs

https://blogs.newardassociates.com/blog/2026/titit-local-ai.html
2•zdw•33m ago•0 comments

Italian bill proposes curbs on social media addiction

https://www.reuters.com/legal/litigation/italian-bill-proposes-curbs-social-media-addiction-2026-...
1•1vuio0pswjnm7•36m ago•0 comments

Searches for Piracy Increased over the Past 5 Years

https://trends.google.com/trends/explore?date=today%205-y&geo=US&q=piracy&hl=en-US
1•Cider9986•36m ago•0 comments

Musk: SpaceX IPO to fund space data centers. MSFT undersea fail sounds warning

https://www.reuters.com/business/aerospace-defense/spacexs-orbital-data-centers-could-face-same-h...
1•1vuio0pswjnm7•37m ago•0 comments

Show HN: JavaScript Obfuscator

https://github.com/nstarke/egodeath
1•bootbloopers•38m ago•0 comments

The Math of Friday 13th

https://www.scientificamerican.com/article/why-friday-the-13th-is-a-mathematical-inevitability/
1•pixiemaster•38m ago•0 comments

Show HN: Tileserver-RS – Tile Server in Rust with MapLibre Native Rendering

https://github.com/vinayakkulkarni/tileserver-rs
2•vinayakkulkarni•43m ago•0 comments

I rebuilt the same project after 15 years – what changed in web dev

https://bamwor.com/en/news/rebuilt-same-project-after-15-years
1•manudaro•44m ago•0 comments

Embracing AI with Claude's C Compiler

https://chipsandcheese.com/p/embracing-ai-with-claudes-c-compiler
1•signa11•45m ago•0 comments

Pair Programming in the Age of Agents

https://mattwynne.net/pair-programming-in-the-age-of-agents
1•mattwynne•47m ago•0 comments

I built a programming language on the top of Node.js

https://github.com/dominexmacedon-dev/starlight-cli-script
2•dominexmacedon•50m ago•1 comments

Vietnamization (1969)

https://en.wikipedia.org/wiki/Vietnamization
1•ValentineC•57m ago•0 comments

Ask HN: Why is almost all of API documentation online?

1•triilman•58m ago•0 comments

RSL: Simple Licensing

https://rslstandard.org/
2•fagnerbrack•59m ago•0 comments

How to take down a US F-35 over Iran? Chinese engineer's tutorial goes viral

https://www.scmp.com/news/china/science/article/3348619/how-take-down-us-f-35-over-iran-chinese-e...
2•KnuthIsGod•1h ago•0 comments

What Agents Need Before They Handle Real Money

https://catenalabs.com/blog/what-agents-need-before-they-handle-real-money/
3•jorgereyna•1h ago•2 comments

It's time for the 'Sell painkillers, not vitamins' metaphor to die

https://www.pathsensitive.com/2023/09/its-time-for-painkillers-vitamins-die.html
2•zrkrlc•1h ago•0 comments

History Behind the SpaceX IPO

https://ioc.exchange/@muskfiles/116333241408716236
4•infinitewars•1h ago•2 comments

Chinese government bonds emerge as lone war haven

https://www.ft.com/content/72215587-4b6c-454c-85ff-6956132705d9
2•toomuchtodo•1h ago•0 comments

I watch most videos at single speed

https://liquidbrain.net/blog/single-speed/
1•kurinikku•1h ago•0 comments

Delve – Fake Compliance as a Service – Part II – Day 2 of 5

https://deepdelver.substack.com/p/delve-fake-compliance-as-a-service-98a
4•Garbage•1h ago•1 comments

Intro to Reality Pentesting

https://cptkj.substack.com/p/intro-to-reality-pentesting
1•curmudgeon22•1h ago•0 comments

iOS 27 Rumored to Feature Keyboard Upgrade

https://www.macrumors.com/2026/04/01/ios-27-upgraded-keyboard-rumor/
1•Tomte•1h ago•0 comments