"Contact us" form was attacked.
Usually the attacks on the form were email header injection attacks.
My form was already protected from email header injection attacks.
Now I found this form was attacked in a hard way.
The attack is not an email header injection attack, this attack is sending valid data (so it will pass my validation checking) one copy (one email as the sender), a time to my "contact us" form.
And my "contact us" form is not designed to reply to the sender. So this attack will not generate email sent out form my server.
All it did is pile up thousands emails on our info@mysite.com.
My question is what the purpose of this attack for? they have no financial benefits.
And how to prevent this kind stupid attack? every simple online form has to use visual confirmation now?
Many visual confirmations are already broken by hackers too. They just didn't bother to attack them yet due to there are so many easy forms without visual confirmations. Visual confirmation more like "I don't have to run faster than the bear, I just have to run faster than you."
Even we add visual confirmation to all the forms of all the sites we run on our server, still if one hacker decided that he would use these tools available now to broke our visual confirmation a few months later, than what should I do?
Are there any other ways to stop it?
Thanks!