Skip to content

Commit 48c2642

Browse files
authored
Announce prohibition of Outlook email addresses (#16107)
1 parent 95949f1 commit 48c2642

File tree

1 file changed

+58
-0
lines changed

1 file changed

+58
-0
lines changed
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: "Prohibiting Outlook email domains"
3+
description: We have prohibited new registrations of accounts using Outlook email domains.
4+
authors:
5+
- ewdurbin
6+
date: 2024-06-16T00:00:00
7+
tags:
8+
- security
9+
- transparency
10+
---
11+
12+
In response to ongoing mass bot account registrations, Outlook domains
13+
`outlook.com` and `hotmail.com` have been prohibited from
14+
new associations with PyPI accounts.
15+
This includes new registrations as well as adding as additional addresses.
16+
17+
<!-- more -->
18+
19+
If you have been following PyPI here on our blog, or in the news,
20+
it should come as no surprise that malware and abuse has been part of our
21+
day-to-day concerns for many years.
22+
23+
In response we have added more and more layers of protection to our systems
24+
which dissuade abuse. These escalations have included
25+
improved bot deterrence via captcha,
26+
requiring verified email addresses to perform actions with new accounts,
27+
changes to our 2FA on-boarding process,
28+
as well as ratelimits and other "basic" methods.
29+
30+
One of the most impactful mechanisms we currently have is prohibiting
31+
known "throw-away" email domains from creating accounts on the index.
32+
We currently use the [disposable-email-domains](https://github.com/disposable-email-domains/disposable-email-domains)
33+
list as well as our own internal list to block registration with
34+
-or association of -
35+
such domains for PyPI accounts.
36+
37+
In the last year as malware campaigns have become more and more sophisticated
38+
and coordinated, these prohibitions have proven very impactful with one major
39+
exception.
40+
41+
In a campaign today which included over 160 projects *and* associated new user
42+
registrations, the accounts were registered using
43+
`outlook.com` and `hotmail.com`
44+
email addresses.
45+
Past campaigns of similar scale have had similar characteristics.
46+
47+
This indicates to us that the Outlook email services are falling short of other
48+
major email providers in prevention of automated, bot, and bulk signups for new
49+
accounts.
50+
51+
Past campaigns have shown similar characteristics, those who hope to circumvent
52+
our protections tend to use or pay for bot farms which are able to bypass
53+
automation detection of Outlook email accounts in order to establish accounts
54+
on PyPI with ostensibly trustworthy email addresses.
55+
56+
We hope that this change does not need to be permanent,
57+
given our current capacity for response and tooling it is the next step that we
58+
currently have.

0 commit comments

Comments
 (0)