Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Spam

Tracking Spam to the Source 366

cygnusx writes: "MSNBC is carrying a Wall Street Journal article on one reporter's attempts to track the spam she receives to the source. Armed with a few Hotmail and Yahoo accounts, reporter Stacy Forster actually responded to most of the barrage of spam she began to receive after a week or so. Not quite the best investigative jounalism ever seen, but still a good glimpse (or so I thought) at those who send us those unloved missives about "exciting business opportunities" and "millions of $$$ waiting"."
This discussion has been archived. No new comments can be posted.

Tracking Spam to the Source

Comments Filter:
  • Bellsouth = Spam (Score:5, Interesting)

    by Renraku ( 518261 ) on Saturday February 09, 2002 @04:48PM (#2980056) Homepage
    When I signed up for their ADSL service, I used a very odd username which I haven't used before, nor have I ever seen. I checked my email a day (after the account was made, not after I got DSL) later and guess what? Two email from Bellsouth, one from some porn company. I posted my findings to DSL reports, and got fired from my tech support job at Bellsouth DSL for that.
  • Just use PINE and... (Score:4, Interesting)

    by Colin Bayer ( 313849 ) <<gro.sulucci> <ta> <nogov>> on Saturday February 09, 2002 @04:49PM (#2980058) Homepage
    turn on "enable-bounce-cmd" in your prefs. Open the spam, hit "B", tippity-tap out the source e-mail address (or flex your gpm muscles if you're so inclined), and off it goes back to the sender; alternately, do your best to fudge a mailer daemon bounce. When they get the message, 9 times out of 10, they stop sending. Failing that, just redirect known bad domains (I do this with Yahoo and Hotmail because I don't know anybody who uses those accounts) into a spam folder; check it occasionally to make sure the signal-to-noise ratio is non-zero.

    It's not worth getting all hot and bothered over some "INCREDIBLE MONEY MAKING OPPORTUNITY" someone felt like telling you about.

    On another note, check out somethingawful's pranks section under spam for Lowtax's take on the whole thing. :)
  • by oregon ( 554165 ) on Saturday February 09, 2002 @04:50PM (#2980059) Homepage
    junkbuster [junkbusters.org] blocked 15 images from loading in that one article.
  • by Atrahasis ( 556602 ) on Saturday February 09, 2002 @04:53PM (#2980071) Homepage
    ....and you get a pop-up banner offering you the best casino the net has to offer.

    D'oh!

  • by chrysalis ( 50680 ) on Saturday February 09, 2002 @05:11PM (#2980114) Homepage
    Instead of using SPAM filters (accept everything by default, deny some mails according to filters), a new and very efficient approach is to do like firewalls :
    • Deny everything by default
    • Only accept mails from known sources.

    Software like TMDA [sourceforge.net] implements this. When a mail comes from an known source, an automatic confirmation mail is sent by the script. If the sender acknowledges, his address will be added to the 'whitelist'. No more confirmation will be needed.
    This is extremely efficient, and it basically reduces the SPAM actually delivered to your mailbox to zero.
    Just don't forget to manually add mailing-lists you're subscribed to, to the 'whitelist'.


  • by writermike ( 57327 ) on Saturday February 09, 2002 @05:13PM (#2980121)
    I want to know about one more part of the story.

    She says she signed up a Yahoo account, bought one book from Borders.com and promptly received spam thereafter.

    Sooooo.... if Borders _and_ Yahoo both say they there's no way the e-mail could have been sent out by either of them -- (and if the reporter is completely accurate about her sequence of events) -- how did the company get her e-mail address?

    Either someone's lying, is mistaken, or her e-mail address was "created" through some sort of bruteforce e-mail address creation application.

    Cheers,

    Mike...
  • by GCP ( 122438 ) on Saturday February 09, 2002 @05:16PM (#2980131)
    I think we should have a server feature that is configurable from the client. The client would be able to tell the server that if a message has certain characteristics, the server should respond to the sender in the same way it would respond if the address didn't exist at all.

    Any message that your client would filter into the trash, your client should be able to tell the server to bounce.

    Perhaps we could also use the "plus convention" to allow users to effectively manage their own email address(es). Many servers are set up so that if my assigned email address is fred@foo.com, then fred+[anystring]@foo.com is still sent to fred. Tell your friends to address you as fred+friend@foo.com, and then have your client sort the "+friend" messages into a friends folder.

    Why not be able to create a list of valid plus extensions in your client, which would then post them to the server? Why not be able to create your own rule for messages that arrive with no extension? You could instruct your client to instruct the server to accept them or to bounce them back to the sender as simply nonexistent addresses.

    You could create an extension in your client and specify an expiration date. Your client informs the server. Then you post your email address publicly, a Usenet question perhaps, and your server would accept responses until the date you specify, and then bounce everything thereafter as spam.

    With so many addresses expiring quickly and users able to get their servers to hide their non-expiring addresses from mail with certain characteristics, the spammers databases would become much less usable.

  • by Anonymous Coward on Saturday February 09, 2002 @05:18PM (#2980143)
    At the current rate of spam increasing everyones mail accounts will be made unusable with in the next 2 year or less.

    So people should just bounce all html mail. What ever mail client that you use. As almost all porn mails require to download images from somewhere or try run some Javascript.

    Report spam to ISP concerned and ask politely your ISPs to start implement RBL lists.

    If people do not stand up a shoud we dont want this junk, email will die.

    RIP 2002 Email accounts the world over.

  • Track down the scum (Score:2, Interesting)

    by www.sorehands.com ( 142825 ) on Saturday February 09, 2002 @05:20PM (#2980149) Homepage
    Put terms of use on your websites to prohibit email collection. Use a unique email address on the site, so it can be tracke.


    Then when the spammer emails to it, track them down, file a large lawsuit for copyright infringment, tresspass to chattel, computer tresspass and fraud.

    Bankrupt a few spammers, others may think twice before spamming

  • by javilon ( 99157 ) on Saturday February 09, 2002 @05:20PM (#2980150) Homepage
    I have got a better Idea.

    Somebody writes an e-mail system where sending messages cost money. Lets say 50 cents per message. That looks like a lot, but bare with me...
    You read the message, and, if you want it, you accept it and the operator cancels the charge. Otherwise the sender gets charged.
    You don't charge your friends, or any wanted mail but you do charge commercial entities and spammers (if you want).
    Money from charges goes to the mail operator, so it does make some $$$ from the service. But this $$$ don't come from you, unless you are adept to send unwanted mail.
    Now lets see how much do this 10-15 new customers cost: 15,000 cents x 50 cents / 10 new customers = 600$.
    That would be a day. For a year he would be charged about 200,000$.
    That would stop most spammers.
  • Re:Bellsouth = Spam (Score:2, Interesting)

    by linzeal ( 197905 ) on Saturday February 09, 2002 @05:21PM (#2980156) Journal
    Well until the tech workers unionize you are going to get shit on. I contracted for SBC and saw the same thing happen to a guy in project management who finnaly snapped and told a customer on a 700 million dollar deal that we can't get the VPN/DSL installs on time because we have no process or process engineer and no one wants to take responsibility for a 700 million dollar deal gone bad.
  • by BillTheKatt ( 537517 ) on Saturday February 09, 2002 @05:23PM (#2980160)
    I've been sending SPAM to abuse/postmaster/uce@ftc.gov for months, but most ISPs will just terminate the account if they even bother.
    We should be encouraging hackers to point their skills towards a noble goal: shutting down SPAMMER websites. SPAMMER's would take notice when their sites were hacked and redirected to Spamcop. And ISPs would really start to check accounts if their service became a transport for DDOS attacks against a SPAMMER.
    Come on hackers it's easy. Create a hotmail account and post just once to USENET. I'm still getting SPAM 4 years after posting 1 message to USENET with a real address. Do something positive to the Internet community for a change. Get to work hacking those jerks' sites!
  • by FyRE666 ( 263011 ) on Saturday February 09, 2002 @05:28PM (#2980189) Homepage
    I've been thinking about this...

    Facts:

    The only way to stop spammers is to make spamming unprofitable.

    Their profit depends upon harvesting usable email lists, so there's a chance some idiot will buy something after reading their garbage.

    Solution(?):

    Dilute their mailing lists with so much garbage they'll only actually send out one or two emails to real addresses for every X thousand mails sent to fake addresses.

    Method idea:

    What if I put together a quick CGI to generate pages with fake text (just paragraphs full of random picks from a dictionary + punctuation) plus randomly created email addresses. Then linked to the chain of 1000's of fake pages from one of the real pages of my sites? What if I allowed anyone to use this tool for their own sites, to generate 1000's more, or made an online tool to generate pages and email them on to people to upload for their websites?

    Anyone think this is a good idea? Obviously it's a trivial piece of scripting, but I think if major sites used something like this, it would seriously piss off a lot of these lowlifes...
  • by e_n_d_o ( 150968 ) on Saturday February 09, 2002 @05:29PM (#2980193)
    This is probably old news, but its just a thought.

    What if it were required by law that every company must track WHERE and WHEN they obtained any e-mail address that they send bulk messages to. If you requested to be removed from their list "recursively" the offending company would have to notify its provider. Each company would have to notify any company they bought the address from that you want your information kept PRIVATE. The recursive notification would only go UP the chain. I'd love if it they had to notify everyone they sold it to as well, but this might not be practical. Each provider would send you a message as they removed you from their list. Each company would have to keep your e-mail address on a black list for a period of time you specify (such as "until hell freezes over") and not send you further mesasges until that time elapses.

    You would have as evidence the date/time you were removed and would have grounds for damages in the event that someone repurchased your address from a provider or they didn't remove you.

    Until then, I'll just continue to give my email address out as myname_companyimgivingitto@mydomain.com
    So far, 99% of the spam is coming from myname_usenet@mydomain.com, which is about to be automatically filtered and deleted.
  • by trentfoley ( 226635 ) on Saturday February 09, 2002 @05:31PM (#2980201) Homepage Journal
    The popunder for the "World's Largest Casino." (NOT)

    If by (NOT), you mean the popunder did not happen, then disregard this post. Otherwise... I tried loading the msnbc page several times from various boxes and could not get a popunder to appear.

    Are you sure you don't have something installed inadvertently that creates these popunders? If you haven't already, give something like AdAware [lsfileserv.com] a try to see just what is lurking about.

    If you are absolutely sure that you are getting popunders from msnbc, then why the hell am I not getting them! I hate feeling left-out.

  • by sqlrob ( 173498 ) on Saturday February 09, 2002 @05:31PM (#2980204)
    What spammers sometimes do is to dictionary-attack

    That's one hell of a dictionary attack. From the article(emphasis mine):
    Using my name and a combination of six numbers, I created a few new accounts through free online services such as Microsoft Corp.'s Hotmail and Yahoo Inc.'s YahooMail.

  • by travisd ( 35242 ) <travisd@[ ]as.net ['tub' in gap]> on Saturday February 09, 2002 @05:35PM (#2980214) Homepage
    You mean line Wpoison? [monkeys.com]
  • by Saeculorum ( 547931 ) on Saturday February 09, 2002 @05:36PM (#2980219)
    GCP says: Perhaps we could also use the "plus convention" to allow users to effectively manage their own email address(es). Many servers are set up so that if my assigned email address is fred@foo.com, then fred+[anystring]@foo.com is still sent to fred. Tell your friends to address you as fred+friend@foo.com, and then have your client sort the "+friend" messages into a friends folder.

    I think that's a good idea, but only a short-term solution. If it ever becomes wide-spread, spammers will just use brute force and send emails to fred+%dictionary_word@foo.com. It wouldn't even be that hard - most likely, people would somewhere accidentally post their "secret" email address (which happens right now) and a spambot would pick that up. Above that, most people would use common words, "secret", "spam", "free", etc. There would be huge incentive to break the system for the spammer - if they're the first to find out how to bypass the secret system, their spams are able to be read by everyone, while other spams will be filtered out. It'll simply be a race to be the first spammer to be "heard".

    The solution must inevitably be, in my mind, to make spam cost something. Not necessarily money, but some sort of tangible resource. Various solutions have been proposed, all of which in my mind are not completely up to the task. However, they're the only effective long-term solution. So long as spam is free, there's no disadvantage to sending 1,000,000 emails to get one responce. I personally like Adam Backs' Hashcash program, which is at www.cypherspace.org/~adam/hashcash/> [cypherspace.org]. However, the site seems to be down at the moment, so one can use Google's quite convinient cache of it at http://www.google.com/search?q=cache:-g8yVfQ3vFwC: www.cypherspace.org/~adam/hashcash/ [google.com].
  • by ealar dlanvuli ( 523604 ) <froggie6@mchsi.com> on Saturday February 09, 2002 @06:21PM (#2980331) Homepage
    I'm currently a telemarketer to help cover college fees ($8/hour is really hard to pass up if you normally have trouble coming up with book money)

    I hate it, but its great money. I am not a good telemarketer by any means, and I refuse to coerce anyone, but I normally get enough sales by just being honest with the customer.

    I plan on quitting the moment I get a comparable paying job, fyi
  • > Perhaps we could also use the "plus convention" to
    > allow users to effectively manage their own email
    > address(es). Many servers are set up so that if my
    > assigned email address is fred@foo.com, then
    > fred+[anystring]@foo.com is still sent to fred.
    > Tell your friends to address you as
    > fred+friend@foo.com, and then have your client
    > sort the "+friend" messages into a friends folder.

    FWIW, I use qmail so I use a minus sign as opposed to a plus but I see your point.

    How about the opposite approach? Start an automated service running at foo.com . We create a dummy address dummy@foo.com . We create a whack of aliases: dummy-ebay, dummy-chapters, etc. We give each address to only company. Then we do metrics on the amount of spam inbound to each of these addresses and post results to the web.

    Are we still concerned with dictionary attacks? Then we make the suffix of the dummy address something essentially random... perhaps we md5 the name of the company and use that as a key. So dummy-chapters becomes dummy-c463e91ad6440efcf637a78054a11e06 . I find it pretty hard to believe that a dictionary attack is going to hit that address any time soon.

    Some of the spam protection agencies out there could set this up on anonymous domains. I can't think of any way to get more real-world testing.

    BTW, if there is some service out there that does this sort of thing then please feel free to add a followup to this post. It seems like a relatively intuitive idea so I doubt that I'm the first to think of it.

    --
    -mikecarrmikecarr
  • Soutions for ISPs (Score:2, Interesting)

    by dissy ( 172727 ) on Saturday February 09, 2002 @06:38PM (#2980375)
    While most filtering programs and package mentioned here are for the individual user, or one that has their own mail server, what would you suggest for ISPs to use?

    Its not possible to do the 'deny all, allow from a list' at the root level as you have no idea what customers will want to allow.
    RBL helps some of course, but not much.

    Subject filters help abit too but only for words you Know will be in spam, and sometimes it needs to be multiple words which means a spammer can rearange the subject and it will still get past.

    The ISP I work for has been in business for about 7 years now under the same domain name, and has been dictonary scanned/spammed so even when adding a new account chances are someone has been sending spam to that address for alot time before it existed.

    Blocking spam by the relay server used is not possible. I get over 500 spams a day to the normal administration addresses (staff hostmaster postmaster etc) and generally 475 of them are different servers. It would not be possible to filter them all, and even so the chances of the relay server being used a second time appears very low.

    Most of the 'server-wide' filter programs are designed to try and not block ligit email.
    Unfortunatly this means it blocks very little spam in the process.

    Would anyone know of any solutions we havent thought of?
  • by anthony_dipierro ( 543308 ) on Saturday February 09, 2002 @06:57PM (#2980424) Journal

    I create a new alias that bounces or /dev/null's email coming into that account.

    I've been doing this for a while (actually, I usually forward the spam back to the abuse address of the person who leaked the address), unfortunately, I've run into two problems:

    First of all, I have a somewhat popular domain name, and used to get lots of spam from people who lie about their email address and just put in blahblahblah@inbox.org. So to fix that I had to create a white-list rather than a black-list.

    The second problem is really a result of the fix to the first. I can't simply use ebay@inbox.org, etc, because that's too easy to guess (security through obscurity), so I have to make something up. Unfortunately, I can't really remember the made up names, and I don't always have access to inbox.org to set up the white list. So instead I have an MD5 scheme. Take the name of the site, a number (incremented whenever I want to change the email address), and a special "password". Put them together in a certain order, and MD5 it (http://pajhome.org.uk/crypt/md5/ is available on any computer with javascript). So for slashdot, my current email address is 4e9fd9f4624c02685096769364a81d95@inbox.org (which I have to change since I'm now getting spam every couple days to this address). I keep the numbers (and actually the usernames) in a list on a certain publically accessible web page (javascript DES protected of course). So wherever I am as long as I have javascript access, I never forget the information I put in.

    I just figured a new addition though. Put the domain name and the number in the beginning of the email address. So this email address would be slashdot14e9fd9f4624c02685096769364a81d95@inbox.or g (you don't need a separator since the MD5 is a fixed size?). The advantage is that I no longer have to have a white list in the first place, because the mail machine can simply check the full MD5.

  • Comment removed (Score:5, Interesting)

    by account_deleted ( 4530225 ) on Saturday February 09, 2002 @06:58PM (#2980427)
    Comment removed based on user account deletion
  • by sunhou ( 238795 ) on Saturday February 09, 2002 @08:44PM (#2980677)
    Any predictions for how long it will be until spammers have a valid (if temporary) reply-to address in their header, and a program that parses automatic replies from TMDA and jumps through the necessary hoop to be added to people's whitelists?

    Plus they'd have the added bonus of knowing it's a valid address. Although the disadvantage of knowing it's someone who hates spam enough to set up TMDA to avoid it... Actually, to answer my own question, I don't think spammers will bother unless a lot of people start running TMDA. But still, this is an evolutionary arms race, and TMDA is not the Weapon To End The War. It's a pretty good weapon, but as others have pointed out, some people just don't get it. I can just imagine my mom trying to understand the TMDA auto-response. And sure, I could add her to my whitelist ahead of time, but I've got some old friends I haven't heard from in a long time who occasionally track me down, and I think some of them would be just as confused.
  • by Anonymous Coward on Saturday February 09, 2002 @09:04PM (#2980732)
    9 times out of 10? Either you're lucky or you're making this up.

    I've been running a system with about 1500 users for a bit over 6 years. This means I have a LOT of people that no longer exist. I've been the admin since the system went online, and I know when many of these people left.

    There are some accounts that are STILL getting hammered, despite returning permanent failures for over 2 years. I finally had to come up with a process for blocking these twits for good - first by domain, and then in terms of the IP layer.

    So what happens now? I have a ton of incoming DNS queries from these idiots, since they can't get to my primaries. Now I have to start using Bind 9's views just to give them bogus DNS with a high TTL so they'll FOAD and stop pissing on my networks.

    Besides, look at the story of "Nadine" - there's an account that was _never_ valid, but it still gets sold to every spammer whore out there. Once they get an address - valid or not - you're screwed.
  • by guttentag ( 313541 ) on Saturday February 09, 2002 @10:10PM (#2980904) Journal
    In the article she says she set up several accounts but only gave one of those addresses to a third party (she bought a gift certificate from Borders). Less than a week later, the email address she gave to Borders began receiving more spam than the other addresses.

    The only difference between the accounts is that the one she divulged to Borders received more spam; therefore Borders sold her address (and who knows what else), despite the fact that Borders told her its "Privacy Policy" prohibits it from doing that. The only reason the reporter didn't write "Borders lied" is because then the WSJ could get slapped with a lawsuit.

    The lesson here is that companies are in no way obligated to tell you (or a WSJ reporter) the truth if it's not in their best interest. Companies imply that Privacy Policies are binding legal contracts, but they're not; they are statements of what the company thinks you want to hear.

  • Re:use filters.. (Score:2, Interesting)

    by duren686 ( 463275 ) on Saturday February 09, 2002 @10:18PM (#2980915) Homepage Journal
    abuse@warez.slashdot.org for those that have blocked their own domain.. For those not "in the know," warez.slashdot.org redirects to 127.0.0.1
  • by Technician ( 215283 ) on Saturday February 09, 2002 @10:38PM (#2980960)
    I had a paper trail on a snail mail issue I had with the Oregon Department of Transportation. I registered my new car (got plates). Due to a typo, my middle initial was wrong on the title and registration. I was going to correct it when I got a chance, but changed my mind when I got my first junk mail with the same mistake. After that, I decided not to correct the error. About 1/3 of my junk mail had that error for as long as I owned my car. About half the telemarketers also asked for me by that name. It was mostly chimney sweeps, re-financers, and vinyl siding salesmen. They were totaly useless calls as I was renting an apartment at that time and it didn't have a fireplace. I should have had them drop by for the free estimate to waste some of their time. Maybe they will get their demographic close enough to quit bothering me.
  • Re:Bellsouth = Spam (Score:2, Interesting)

    by Renraku ( 518261 ) on Saturday February 09, 2002 @11:07PM (#2981027) Homepage
    I don't think slander/libel applies to Internet message boards/chat rooms. Besides, I did NOT post my real name. I didn't post the company I work for. I posted it as an opinion. The funny part is that everyone I knew that worked there agreed with me on the subject. Thats like 30 people. When 31 people in one tech support place agree that email addresses are being sold as they're made, it should be a sign to the ISP that people know about it. Not a sign to fire people who like the truth to be out.
  • by Dominic_Mazzoni ( 125164 ) on Saturday February 09, 2002 @11:22PM (#2981067) Homepage
    Normally, spammers use bogus return addresses, right?

    So how about this: every time my computer receives an email, it initiates a connection to the sender and tries to send a reply message. If the sender's server accepts the email address, close the connection (i.e. cancel the message before it's finished). If the server rejects the email address, you know the return address is invalid, so you can throw away the message (or filter it into a different box).

    Of course, spammers might start to make the return addresses random (but valid) return addresses at yahoo, etc. - but that will just get Yahoo very, very mad, and they'll track down and sue the spammers.

    Probably never gonna happen, but I've never heard that particular idea before...

  • by Ilgaz ( 86384 ) on Sunday February 10, 2002 @04:24AM (#2981581) Homepage
    Notice the hotmail account guys who was tricked by the MSN Messanger setup talking about "We never gave our mails, not even using it but when we checked not to get it suspended , we figured there are 100 spams!"?

    A guy/gal using Hotmail gets heavily advertised to use and install MSN Messanger and some does it just to have a online mail checker for hotmail.

    Now the freaky part begins... http://news.com.com/2100-1001-833154.html

    Yes... With a not-so-advanced 133t jscript tactics, they can harvest your mail AND the mails of others unless they use a nickname. I don't see any reason like 90% of people would change their know Hotmail adresses to nicknames.

    More interestingly CNET reporter tries to say (I congratulated him for breaking that story btw) "It is not so serious". YES it is serious!

    For months I was telling my friends I am not using MSN messanger because I believe spammers/harvesters found a way to get my MSN signon name and spamming me. They called me paranoid, anti-ms but recent days they admitted "We don't know how too but there must be a way and we are getting spams"

    Can anyone tell me how that glitch isn't serious?

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...