|
I'm getting lots as well. The problem with this spam is that 'investigating' it can create a perilous trail of footprints which might be used against the original victim of the spam.
What's the current methodology for dealing with this. I used to track the links to determine the beneficiery, but I aint tracking this crap.
|