That spammer had some powerful friends...
Moderators:Best First, spiderfrommars, IronHide
- Kaylee
- Big Honking Planet Eater
- Posts:4071
- Joined:Thu Oct 26, 2000 12:00 am
- ::More venomous than I appear
- Location:Ashford, Kent, UK.
- Contact:
http://www.theregister.co.uk/2006/05/17 ... ity_folds/
A service which I've been using to help cut down my spam has been shut down... by spam.
It simply works by members reporting spam messages back to bluesecurity, who then bounce the messages back to their source- i.e. for every spam the spammer sends, it gets reflected back at them multiplied by the number of people they sent it to. They also did a good job of reporting illegal websites to various international bodies such as interpol.
Their service has finally been shut down by a Russian spammer who seems to have some incredibly powerful friends on the Internet- he was not only able to organise with the top-level DNS servers to have Bluesecurity taken down/redirected, he was able to coordinate a huge DDoS attack against their standin website taking down LiveJournal also.
TBH I'm pretty shocked... I get about 10 junk messages a day to my private email and about 40 to both of my hotmail accounts. Bluesecurity's tactics may have been extreme but personally it sounded like a fantastic idea. I guess this proves that, unless they're organising terrorism or child porn rings, nobody really has the power to stop villains on the Internet.
A service which I've been using to help cut down my spam has been shut down... by spam.
It simply works by members reporting spam messages back to bluesecurity, who then bounce the messages back to their source- i.e. for every spam the spammer sends, it gets reflected back at them multiplied by the number of people they sent it to. They also did a good job of reporting illegal websites to various international bodies such as interpol.
Their service has finally been shut down by a Russian spammer who seems to have some incredibly powerful friends on the Internet- he was not only able to organise with the top-level DNS servers to have Bluesecurity taken down/redirected, he was able to coordinate a huge DDoS attack against their standin website taking down LiveJournal also.
TBH I'm pretty shocked... I get about 10 junk messages a day to my private email and about 40 to both of my hotmail accounts. Bluesecurity's tactics may have been extreme but personally it sounded like a fantastic idea. I guess this proves that, unless they're organising terrorism or child porn rings, nobody really has the power to stop villains on the Internet.
- Denyer
- Over Pompous Autobot Commander
- Posts:2155
- Joined:Tue Oct 17, 2000 11:00 pm
- ::Yesterday's model
- Contact:
Well, the power's arguably there, but nobody with it cares much... or they're commercial entities selling protection to casinos.
Dunno about the connection out of their home country, but Blue Security themselves redirected DNS to an uninvolved third party (Typepad) -- who promptly buckled, taking down many unrelated sites.
The "clean lists" were extremely short-sighted, as anyone with a clue would come up with the idea of comparing a backup with a "cleaned" copy and thus identify members of the service. I wonder how many of the users knew and understood this when they signed up.
Dunno about the connection out of their home country, but Blue Security themselves redirected DNS to an uninvolved third party (Typepad) -- who promptly buckled, taking down many unrelated sites.
The "clean lists" were extremely short-sighted, as anyone with a clue would come up with the idea of comparing a backup with a "cleaned" copy and thus identify members of the service. I wonder how many of the users knew and understood this when they signed up.
- Kaylee
- Big Honking Planet Eater
- Posts:4071
- Joined:Thu Oct 26, 2000 12:00 am
- ::More venomous than I appear
- Location:Ashford, Kent, UK.
- Contact:
IDing members I don't think was ever really an issue (especially as by default it advertised your email and bluesecurity status in the emails it bounced back ). I think the original idea was simple brute force spam attacks back against the spammer, the ultimatum being leave people on the white list alone or you get your own spam bounced back at you many times over.
- Predabot
- Big Honking Planet Eater
- Posts:3119
- Joined:Sun Apr 06, 2003 11:00 pm
- ::Scraplet
- Location:Northern sweden
This sounded absolutely fantastic. I really hope someone tries a new similar site, since the need and the market for this service is DEFINITELY out there.
And I don't care about sites that get put on this spam-list having only a small amount of spam, if they somehow distribute spam even once, then they deserve it TEN-FOLD back, no matter how small the crime.
And I don't care about sites that get put on this spam-list having only a small amount of spam, if they somehow distribute spam even once, then they deserve it TEN-FOLD back, no matter how small the crime.
- Denyer
- Over Pompous Autobot Commander
- Posts:2155
- Joined:Tue Oct 17, 2000 11:00 pm
- ::Yesterday's model
- Contact:
Legitimate mailing lists have more problems than most spammers, due to users signing up for things and then hitting the "spam" button rather than the "delete" one in their webmail accounts.Predabot wrote:if they somehow distribute spam even once
edit:
How would this work in practice, with the initial source usually being masked?I think the original idea was simple brute force spam attacks back against the spammer, the ultimatum being leave people on the white list alone or you get your own spam bounced back at you many times over.
- Metal Vendetta
- Big Honking Planet Eater
- Posts:4950
- Joined:Mon Feb 12, 2001 12:00 am
- Location:Lahndan, innit
I've no sympathy - I've ended up on loads of "legitimate" mailing lists without wanting to, and it's well difficult to get off them sometimes. I don't have a problem sending the millions of mails eBay send me every day to the spam filter, for example. When I signed up I must have missed the option that said "uncheck this box if you don't want to be best friends and penpals with ebay from now until the day your inbox is completely swamped".
I would have waited a ******* eternity for this!!!!
Impactor returns 2.0, 28th January 2010
Impactor returns 2.0, 28th January 2010
- Denyer
- Over Pompous Autobot Commander
- Posts:2155
- Joined:Tue Oct 17, 2000 11:00 pm
- ::Yesterday's model
- Contact:
Agree in cases of auto-opt-in-on-registration scams. It's not even remotely fair on a company or band when people deliberately sign up and then can't be bothered / don't understand cancelling a subscription, though.
The trouble with bouncing / targeting sites named in spam mail is that faking details leaves open a clear route to launch DoS attacks against people spammers don't like rather than the spammers themselves.
The trouble with bouncing / targeting sites named in spam mail is that faking details leaves open a clear route to launch DoS attacks against people spammers don't like rather than the spammers themselves.
- Kaylee
- Big Honking Planet Eater
- Posts:4071
- Joined:Thu Oct 26, 2000 12:00 am
- ::More venomous than I appear
- Location:Ashford, Kent, UK.
- Contact:
Now that is one thing I did want to know. Bluesecurity never actually divulged the nitty-gritty of how their system worked, moreso how they actually made money considering they were in theory a profit making company. Their website only ever went into a general overview on it. I'm guessing they were probably government or donation funded or somesuch.Denyer wrote:How would this work in practice, with the initial source usually being masked?I think the original idea was simple brute force spam attacks back against the spammer, the ultimatum being leave people on the white list alone or you get your own spam bounced back at you many times over.
Quite how they got around spoofed addresses, IP relays, message bouncing etc. I've no idea; unless they had some high-league help from various huge organisations.
Working backwards along the X-Apparently-Received-By field entires, interrogating each server for message ID verification until it finds one that either doesn't exist or fails verification.Karl Lynch wrote:Quite how they got around spoofed addresses, IP relays, message bouncing etc. I've no idea; unless they had some high-league help from various huge organisations.
PharmaMaster would probably have had their own mail servers set up for such an eventuality and when the level of interest reached a certain point, initiated a DDoS attack.