We’re happy to share feedback from one of our valued clients — Christophe Thielens, founder of BRNDTIME.
At CleanTalk, we truly appreciate hearing how our anti-spam solution helps agencies and businesses keep their websites clean, fast, and user-friendly. Reviews like this motivate our team to continue improving our technology and delivering invisible, reliable protection against spam.
About BRNDTIME
BRNDTIME is a digital marketing agency based in Belgium, focused on helping SMEs and independent professionals grow their online presence. The agency specializes in building high-performance WordPress websites, SEO, online advertising, branding, content creation, and email marketing — always with a strong emphasis on usability, performance, and measurable results.
Client feedback
Christophe shared his experience with CleanTalk both on WordPress.org and on the BRNDTIME website:
“Very good plugin — works very well for my agency. No captchas, no false positives, no slowdowns. A solid and trustworthy plugin.”
BRNDTIME – Digital marketing bureau 01 29 2026 03 19 PM
Using CleanTalk Anti-Spam, BRNDTIME protects WordPress websites from spam submissions without affecting visitor experience. The absence of CAPTCHAs, combined with accurate filtering and no performance impact, allows the agency to focus on building and marketing websites — not cleaning up spam.
We’d like to thank Christophe Thielens and the BRNDTIME team for trusting CleanTalk to protect their projects and for sharing their honest feedback with the WordPress community.
A sophisticated spambot operating under the email address phil9982@bestaitools.my became one of the most active threats in late 2025. Since its discovery on November 10, 2025, this automated attacker has spammed 11,428 websites, with the last recorded activity being December 15, 2025. The CleanTalk anti-spam service currently blocks approximately 9,048 requests per day from this single email address—that’s over 375 spam attempts every hour.
Unlike obvious spam, the messages mimic legitimate customer support requests, making them difficult to detect without advanced anti-spam protection.
This bot sends seemingly mundane questions about service offerings, appearing to be from potential customers:
“Is there a referral program?”
“Do you offer maintenance plans?”
“Do you work weekends?”
“Can I pay with PayPal or other methods?”
“Do you offer support after purchase?”
“Do you offer consultations over Zoom or phone?”
“Do you offer recurring service plans?”
“Do you offer service in rural areas?”
“Can I pick up instead of delivery?”
“Can I get a service checklist after the job?”
“Can I get a quote by text or email?”
“Do you offer financing through a third party?”
It’s very difficult to tell if a message is spam based on its content. This poses the risk of you replying and having your email harvested by spammers. It’s hard to say how they’ll use it, but it’s safe to assume it could be used to send spam to websites or to try to gain access to your website account.
If you’re seeing traffic or spam submissions from this email, here’s how to stop it:
1. Use CleanTalk Anti-Spam Plugin Install the CleanTalk Anti-Spam plugin for your CMS (WordPress, Joomla, Drupal, etc.). It automatically filters requests by checking emails, IPs, and behavior against the global CleanTalk Spam Database.
This email is already blacklisted and will be blocked automatically by the plugin.
2. Manually Block the Email (if needed) If you want to block it manually in addition to using CleanTalk:
Add phil9982@bestaitools.my to your site’s block list.
Block common IPs that were used in attacks.
Monitor your server logs for repetitive POST requests.
phil9982@bestaitools.my is a known spammer attacking thousands of sites daily. By installing proper anti-spam protection like CleanTalk and staying vigilant, you can block these threats before they reach your visitors.
If you’re already using CleanTalk, rest assured — this spammer is on the blacklist and will be filtered automatically.
At CleanTalk, we regularly work with professional WordPress agencies managing business-critical websites across healthcare, infrastructure, and enterprise sectors. In these contexts, security solutions must be reliable, lightweight, and proven over time.
One such example comes from Myanmar, where a regional web development agency, Bold Label, manages multiple high-traffic and high-visibility WordPress sites for enterprise clients.
This approach reduced plugin bloat, simplified maintenance, and made security behavior predictable across different sites and industries.
Securing Medical Platforms at Scale
Healthcare websites are among the most sensitive WordPress environments. They handle patient inquiries, appointment requests, and critical informational content that must remain accessible and trustworthy.
One of the largest diagnostic centers in Myanmar operates its main website on WordPress, with ongoing management by Bold Label. CleanTalk has been actively protecting this site by blocking automated attacks, filtering spam submissions, and preventing malicious access attempts.
The result has been stable operations, clean form data, and minimal administrative overhead through an easy-to-manage dashboard. Security remains effective without interfering with legitimate patients or medical staff. See website.
Protecting Industrial and Corporate Websites
CleanTalk is equally effective for corporate and infrastructure-focused websites that face different threat profiles.
A leading powerline and electrical construction company in Myanmar relies on CleanTalk for malware protection and abuse prevention on its corporate WordPress site. Managed by Bold Label, the site serves as a key business touchpoint for partners and institutional stakeholders.
CleanTalk keeps the site clean, fast, and uncompromised, even under constant background scanning and automated threats. See website.
Why Agencies Standardize on CleanTalk
For agencies like Bold Label, WordPress security is not an upsell feature. It is part of delivery responsibility.
By standardizing on CleanTalk, agencies reduce maintenance complexity, shorten incident response time, and avoid reactive security workflows. This allows development teams to focus on performance, UX, and scalability rather than ongoing cleanup and monitoring.
Practical Security in Real Deployments
These deployments show how CleanTalk operates in real production environments, not just controlled test cases.
Across healthcare and industrial websites, CleanTalk delivers consistent protection with minimal configuration and low ongoing overhead. While these examples come from specific sectors, the same approach applies to any WordPress site that requires stable, long-term security.
The email address dinanikolskaya99@gmail.com has been reported for sending spam and launching automated malicious requests on thousands of websites.
According to CleanTalk BlackLists, this address has:
Attacked over 10,002 websites
Generated approximately 17,304 spam requests in the last 24 hours
The bot uses many different IP addresses from all over the world.
First detected on June 19, 2025
Last activity recorded: Nov 21, 2025 06:28:40 GMT0.
The bot is currently blacklisted in CleanTalk Anti-Spam databases.
What Does This Spam Bot Do?
This spam bot employs a multilingual approach, sending seemingly innocent pricing inquiry messages in various languages to bypass basic spam filters. The messages appear legitimate at first glance, making them particularly insidious for website owners who might mistake them for genuine customer inquiries.
The bot sends variations of pricing inquiries in multiple languages:
Danish: “Hej, jeg ønskede at kende din pris.”
Indonesian: “Hai, saya ingin tahu harga Anda.”
Latin: “Hi, ego volo scire vestri pretium.”
Albanian: “Hi, kam dashur të di çmimin tuaj”
English: “Hi, I wanted to know your price.”
Spanish: “Hola, quería saber tu precio..”
Zulu: “Sawubona, bengifuna ukwazi intengo yakho.”
All these messages translate roughly to: “Hi, I wanted to know your price.”
The bot repeats this pattern on contact and comments forms.
Here is a snapshot from CleanTalk’s logs:
“17304 requests in 24 hours detected from multiple IP addresses. All actions associated with spam form submissions and bot-like behavior.”
dinanikolskaya99@gmail.com spam report Nov 21, 2025 06:28:40 GMT0
How to Block Spam from zekisuquc419@gmail.com
If you’re seeing traffic or spam submissions from this email, here’s how to stop it:
1. Use CleanTalk Anti-Spam Plugin Install the CleanTalk Anti-Spam plugin for your CMS (WordPress, Joomla, Drupal, etc.). It automatically filters requests by checking emails, IPs, and behavior against the global CleanTalk Spam Database.
This email is already blacklisted and will be blocked automatically by the plugin.
2. Manually Block the Email (if needed) If you want to block it manually in addition to using CleanTalk:
Add zekisuquc419@gmail.com to your site’s block list.
Block common IPs that were used in attacks (CleanTalk logs show many from Russian ranges).
Monitor your server logs for repetitive POST requests.
zekisuquc419@gmail.com is a known spammer attacking thousands of sites daily. By installing proper anti-spam protection like CleanTalk and staying vigilant, you can block these threats before they reach your visitors.
If you’re already using CleanTalk, rest assured — this spammer is on the blacklist and will be filtered automatically.
CleanTalk Research Team has identified a severe information disclosure vulnerability in the popular WordPress plugin WP Reset (400,000+ active installations). The issue allows unauthenticated attackers to obtain license keys and sensitive site metadata directly from a publicly accessible log file created by the plugin.
This vulnerability has been assigned CVE-2025-10645 and independently confirmed by Wordfence.
Potential Consequences
1. License Abuse
License Theft: Using stolen keys on other websites
Resale: Illegally selling valid license keys
Financial Losses: Losses to plugin developers from illegal use
2. Targeted Attacks
Infrastructure Reconnaissance: Collecting software version information to find other vulnerabilities
Phishing: Using website information for targeted phishing attacks
Social Engineering: Using data for convincing attacks
3. Privacy Breach
Corporate Data Leak: Exposing organization names and internal URLs
Compliance Issues: Violation of GDPR/CCPA when personal data is leaked
Reputational Risks: Damage to reputation when a leak is discovered
4. Attack Escalation
Exploit Chains: Using nonces and metadata for other attacks
Credential Stuffing: Using obtained information to attack other services
RCE Chains: Combining with other vulnerabilities for remote execution Code
Affected Versions
Confirmed to be vulnerable: WP Reset version 2.05 and earlier Fixed in: version 2.06 (released September 18, 2025)
CVE-2025-10645 poses a serious privacy threat to hundreds of thousands of WordPress sites using WP Reset. While the vulnerability does not allow direct code execution, the leak of license keys and metadata creates significant security risks and can lead to financial losses. This incident highlights the critical importance of secure logging practices:
Never write secrets in plaintext
Store logs outside the web root
Disable verbose logging in production
Audit and purge logs regularly
Developers should treat logging with the same seriousness as password handling—any sensitive information must be protected at all stages of the application lifecycle.
The CleanTalk research team discovered a critical vulnerability in the popular WordPress plugin “Anti-Malware Security and Brute-Force Firewall” (GOTMLS), installed on over 100,000 websites. CVE-2025-11705 allows attackers with minimal privileges (Subscriber level) to read arbitrary files on the server, including the critical wp-config.php file, which contains database credentials and secret keys.
This issue was independently confirmed by multiple parties, including Wordfence, and assigned CVE-2025-11705.
Problem Description The vulnerability is a classic authorization breach chain involving token leakage and cross-context reuse. The main issue is that the GOTMLS_View_Quarantine AJAX endpoint displays the quarantine list to any authorized user without checking access rights or validating nonce tokens.
Summary of the Vulnerability
The plugin exposes an internal AJAX endpoint, GOTMLS_View_Quarantine, to any authenticated user, without performing any capability checks or verifying a security nonce.
When this endpoint renders the quarantine interface, it embeds a valid GOTMLS_mt token into HTML links.
Because other privileged AJAX handlers — such as:
GOTMLS_scan
GOTMLS_empty_trash
— rely only on the leaked token and do not enforce current_user_can(…), a low-privileged user (e.g., Subscriber) can:
✔ Reuse the leaked token ✔ Trigger GOTMLS_scan ✔ Supply an arbitrary file path ✔ Receive the contents of that file
This includes highly sensitive files like:
wp-config.php
credential-containing logs
backup files
environment configuration
Additionally, the same token works with GOTMLS_empty_trash, allowing the attacker to delete quarantine records, effectively tampering with detection artifacts.
Affected versions The vulnerability has been confirmed in version 4.23.81 and earlier of the Anti-Malware Security and Brute-Force Firewall plugin.
The developers have already released a plugin update that addresses this issue. Users should update to the latest version.
We’re happy to share another story from one of our valued clients — Maker Of Jacket.
At CleanTalk, we always appreciate hearing how our service helps real businesses operate more smoothly. Feedback like this motivates our team to continue improving our anti-spam technologies and deliver reliable, invisible protection for websites of all sizes.
About Maker Of Jacket: Since 2017, Maker Of Jacket has specialized in handcrafted, customizable, high-quality jackets and leather apparel. From biker to varsity styles, every piece is crafted with premium materials and trusted by over 6,000 happy customers worldwide. Our products are made-to-order, and we serve customers globally, ensuring a smooth and secure shopping experience.
“How we use CleanTalk:
We use CleanTalk Anti-Spam to protect our website forms, including customer inquiries, order forms, and reviews, from spam bots. Since implementing CleanTalk, we’ve experienced a significant reduction in spam submissions, allowing our team to focus on genuine customer interactions and maintain a safe, efficient online environment.
We’d like to thank Maker Of Jacket for trusting CleanTalk to protect their website and for sharing their experience with our community.”
Best Custom Jackets Handcrafted Unique Stylish Designs Maker of Jacket
From time to time, website owners report a sudden increase in spam activity and try to link it to plugin settings, hosting, or license status. However, these assumptions often overlook how dynamic spam behavior truly is. To illustrate this, I conducted a small study analyzing spam distribution over time using data from several of our WordPress sites.
First, I’ll look at data for three of our WordPress sites, which host our themed blogs. The statistics are for the year.
The screenshot shows the statistics for the year. As you can see from the graph, the number of spam attacks isn’t linear, but fluctuates from month to month. Only since August has there been any stability, and the number of spam attacks has been more or less consistent.
The graph shows an increase in spam attacks at the beginning of the year, followed by a decline to almost zero. However, in May, there is a peak in spam attacks, followed by a sharp decline. Subsequently, there is a slight increase in spam attacks.
The blog was launched recently, and from the very beginning, it was clear that the number of spam attacks was high, but after some time, there was a decrease.
All time 195 spam blocked 10 21 2025 11 29 AM
4. Personal WordPress Test Site
The following graph shows statistics for my personal WordPress site, which I use for testing. The graph shows a steady increase, peaking in May and then declining.
All time 19 510 spam blocked 10 21 2025 11 19 AM
What Does This Tell Us?
Based on this data, I can draw the following conclusions: the number of spam attacks does not show any trend, other than a possible seasonal factor.
The number of spam attacks may not be linear from month to month or even from day to day. At some points, there may be more, at others, fewer. A low-traffic site like my test site can receive a much higher number of spam attacks than a site with more traffic, a larger number of articles, and a higher search engine ranking.
What I did next?
Now let’s talk about how a user can evaluate the difference between the amount of spam a client sees while using an anti-spam service and when the license expires.
First, as you can see on our new site, the number of spam attacks increases as it gets added to spam lists.
Second, when a client installs the CleanTalk Anti-Spam plugin, we have the SpamFireWall option. This option blocks spammers before they reach the site.
CleanTalk Anti Spam Dashboard 10 21 2025 11 20 AM
As you can see from this table, we currently receive 12-14 spam attacks per day. These requests can be found, for example, in the spam folder on their site. On average, there were 57 spam attacks per week, and SpamFireWall (SFW) blocked another 350.
Then, I disabled SFW, and the number of spam attacks reaching the website form immediately increased to 120 on average. So, we see that when using SFW, 50% of spam attacks reach the website and forms, and the remaining spam attacks were stopped by SFW and simply didn’t reach the website.
Therefore, when assessing the amount of spam, we must also take into account the portion of SFW traffic that simply didn’t reach the website forms. You can track statistics for your sites in the Trends section of the ClanTalk Dashboard.
To summarize
The number of spam attacks is not constant and can be higher or lower. Also, when using SFW, you only see a portion of the spam reaching the forms on your website. Having or not having a CleanTalk license doesn’t affect the number of spam attacks.
The CleanTalk Research team has identified a critical vulnerability in the popular WP Statistics plugin (versions up to and including 14.15.3), which is installed on over 600,000 WordPress websites. The vulnerability allows unauthenticated attackers to perform Stored Cross-Site Scripting (XSS), leading to administrative session hijacking, admin panel compromise, and potential code execution on the underlying server OS.
This Unauthenticated Stored XSS vulnerability operates through the HTTP User-Agent header. Attackers can execute arbitrary JavaScript in the WordPress admin panel, enabling them to steal session tokens and nonces, escalate privileges, create administrator accounts, and potentially expand access to the operating system if additional attack vectors are available. Most critically, no authentication is required—a single HTTP request is sufficient, making mass automated exploitation trivial.
The WP Statistics development team has released a security update addressing this vulnerability. Website administrators are strongly urged to update WP Statistics to the latest version immediately.
The CleanTalk Research team specializes in identifying and responsibly disclosing vulnerabilities in popular WordPress plugins and themes. We continue to actively audit plugins and publish technical reports on newly discovered vulnerabilities.
CleanTalk Security Plugin automatically scans your plugins for known vulnerabilities. The plugin monitors the versions of all your installed plugins and themes and immediately alerts you if a vulnerability is detected in one. As soon as a problem is detected (like with WP Statistics), you receive a notification.
We love sharing feedback from our users — and today’s story comes from Robin from WP Guru.
CleanTalk has been a lifesaver for my client’s website on countless occasions. As someone managing SEO-driven lead generation sites and WooCommerce stores, having a reliable solution to combat spam has been an essential part of the development process.
CleanTalk has not only helped me block spam comments and leads, but it has also been instrumental in preventing bots from creating fake orders. This has saved both me and my clients a significant amount of time and hassle.
We’d like to thank Robin and WP Guru for trusting CleanTalk to protect their projects and sharing their experience with the community.
WordPress Developer Sydney WP Guru 10 09 2025 05 01 PM