The Scraping Trap
A chronological breakdown of how a public email address was harvested, enriched, and targeted within 7 days of site launch.
Initial Deployment
During functionality testing, contact@get-it.uk was published in the site footer as a plain-text mailto: link. Within hours, automated bot-scrapers had indexed the domain and added the address to a global "Enrichment Queue".
Link Removal & Initial Spam
The email link was removed as part of hardening. However, the data was already sold. Automated "junk" spam for gambling and high-yield investments began arriving—the signature of a low-level bot harvest.
Brand Impersonation Payload
The attack evolved. By cross-referencing our domain's MX records, threat actors identified Zoho as our service provider. They delivered a "High-Urgency" billing failure notification designed to steal administrative credentials.