Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Spam

What You Get When You Buy a Spam CD 518

defender writes "Recently over here in The Netherlands, the spam versus anti-spam 'war' has hardened. More professional spamming coming from a handful of hard-core spammers utilizing bulletproof hosting in India, chained open proxies, more and more false whois information, etc. One of the more known anti-spam people has been sent one of the subjects of those spams: a CD with millions of e-mail addressess of 'individuals' and hundreds of thousands of 'businesses'... Rejo Zenger has done an analysis of such a CD, which is fuelling new debate as to why the recent EU anti-spam directive was weakened because of businesses complaining or indicating that spam wasn't a big issue for them."
This discussion has been archived. No new comments can be posted.

What You Get When You Buy a Spam CD

Comments Filter:
  • by Tirel ( 692085 ) on Friday January 02, 2004 @02:29PM (#7861536)
    It's been reported that SpamCop is paying upwards to $30K / year for bandwidth as a direct cause of the continous DDOS attacks on it.

    The spammers are doing everything they can to squeeze the anti-spammers out. They use frivolous lawsuits (aka Mark Felstein and his porn spamming backers) or DDOS attacks that either knock the anti-spam resources off completely or increase the costs so that no hobbyist can run them.

    And while all this is going on, the law enforcement agencies are doing nothing to counter the clearly illegal acts of the spammers.

    And ISPs are doing NOTHING to reduce the number of zombies on their networks. So the DDOS attacks continue.

    Nice going.

    It's only a matter of time when someone (Al Queda?) will use the zombie network for something that will truly be noticed.
    • by svanstrom ( 734343 ) <tony@svanstrom.org> on Friday January 02, 2004 @02:34PM (#7861584) Homepage
      Sadly the bad guys can DDOS the good guys, but the good guys can't (easily) DDOS the bad guys... at least not without either using the tactics of the bad guys, or getting caught... =(
      • by the_mad_poster ( 640772 ) <shattoc@adelphia.com> on Friday January 02, 2004 @03:08PM (#7861902) Homepage Journal

        Seriously... what would happen if everyone here went rogue, said "fuck it", and just actively blew away spammers (online, mind you, we don't need any gun-toting geeks for the love of god)?

        With 700,000+ people on slashdot, a less than 1% high techno-competency rate (let the jokes fly...) would yield 7000 individuals from this site alone capable of tracking spam, breaking down proxies and ISPs, stealing and altering logs, etc. How long would it take before 7000 militant hackers working together broke down the spammers under an onslaught of attacks as underhanded as the ones the spammers are using? People like Ralsky aren't even that smart, technologically. I'm willing to bet that once the tough part is done: tracking them, actually beating the daylights out of their systems and them wouldn't be that hard.

        Of course, each individual would have to be willing to deal with the fact that they could be one of the people that gets arrested and charged with a couple of felonies. Sort of like the old trick "yep - all three of you can surely beat me, but the first one in to try it dies". Who wants to be the hero?

        • by svanstrom ( 734343 ) <tony@svanstrom.org> on Friday January 02, 2004 @03:13PM (#7861948) Homepage
          Seriously... what would happen if everyone here went rogue, said "fuck it", and just actively blew away spammers (online, mind you, we don't need any gun-toting geeks for the love of god)?


          We could do it without saying "fuck it"...

          Seriously, it doesn't take a genius to write a virus/worm that take advantage of the latest virus/worm-problem, patches the local system, spends 30 minutes attacking spammers and spreading to other infected systems, after which it just erases itself.

          _ONE_ person is enough for such a thing, and sooner or later someone will do it.
          • by JudgeFurious ( 455868 ) on Friday January 02, 2004 @04:41PM (#7862782)
            Actually no, we probably couldn't do it without saying "fuck it".

            We'd lose that caution to the wind, devil may care edge that most of us crave if we did that.

            I know I'm not participating unless "fuck it" is the official battle cry of this movement.
          • by Julian Morrison ( 5575 ) on Friday January 02, 2004 @05:26PM (#7863173)
            The problem with the "friendly virus" approach: you're trying to install software on zillions of strangers' computers, blindfold. Assuming this is windoze we're talking about here, there are scads of different versions and subversions and patched and hacked OSes. It's a certainty that your "upgrade" will fry the OS in a fair percentage of cases, even if you wrote it without a single bug. Which you won't have done, because its first real test-run will be live.

            The first "great internet worm" was a friendly program that went haywire.
        • For every one 'techno-competent' Slashdot reader who attacks the spammer, there will be ten who get fooled by a Joe job and attack some innocent party.
        • by TPFH ( 92944 ) on Friday January 02, 2004 @07:22PM (#7863981) Homepage Journal
          Seriously... what would happen if everyone here went rogue, said "fuck it", and just actively blew away spammers (online, mind you, we don't need any gun-toting geeks for the love of god)?

          What about Eric Raymond? [catb.org]

          On second thought, guns are too subtle.
          How about we attack spammers with Trebuchets? [trebuchet.com]
          Or fling spammers into walls with a Trebuchet?
    • by tuxette ( 731067 ) * <tuxette.gmail@com> on Friday January 02, 2004 @02:39PM (#7861630) Homepage Journal
      It's only a matter of time when someone (Al Queda?) will use the zombie network for something that will truly be noticed.

      It's only a matter of time when someone (not tuxette though) will do an al Qaida on some notorious spammer or other. There are only so many catalogs and pizzas you can send a spammer...

    • by Lumpy ( 12016 ) on Friday January 02, 2004 @02:48PM (#7861696) Homepage
      A simple answer is a bittorrent solution to the blacklists or other data, or a p2p type of app to get the lists or data out tot he servers/customers.

      if you dont have one target to attack, and not allow the scumbags to modify the data file (md5 sums + other means to ensure the file is real... you can end run these spamming scumbags.

      I for one dont understand why this has not been done already.
      • This is NOT Simple (Score:5, Insightful)

        by ink ( 4325 ) * on Friday January 02, 2004 @03:17PM (#7861988) Homepage
        You say that this is simple, but it is not. In order to have an authoritative source for the data, one must have a named, vulnerable location to dispense it from. P2P networks function because everyone trusts everyone else, and if you download the latest Audioslave video, and it turns out to be Brittany and Modonna making out, well then c'est la vie. If you download the latest blacklist, and it ends up shutting off legitimate email, then mon dieu!

        Bittorrents, for example, must have a seed site out there somewhere. This site can be taken out, and any other "offical" site that mirrors it. If the data is signed, then the offical sources of such signed data are vulnerable (if you need to revoke the key). The general problem of anonomizing traffic, while being able to trust the data on it at the same time, is Hard.

        • In order to have an authoritative source for the data, one must have a named, vulnerable location to dispense it from.

          No, not at all. All you need is PGP. If the file's signature matches, it's the real thing. If it doesn't it's not. Pure P2P.

          Bittorrents, for example, must have a seed site out there somewhere. This site can be taken out, and any other "offical" site that mirrors it

          Gnutella would be much better. No central server.

          If the data is signed, then the offical sources of such signed data a

    • Zounds. Can we expand Godwin's law [faqs.org] to Al Queda?
    • by scrytch ( 9198 ) <chuck@myrealbox.com> on Friday January 02, 2004 @03:07PM (#7861896)
      > It's only a matter of time when someone (Al Queda?) will use the zombie network for something that will truly be noticed.
      <allahuakbar> We require passcodes for your "zombie" network. We will pay generously.
      <bonglord> alla msg me CC#/exp
      <allahuakbar> I can arrange money transfers through fronts, the funds cannot be traced.
      <0wnzj00> hes playin
      <bonglord> STFU, alla no, we need CC, we dont ask whose it is LOL
      <allahuakbar> Excuse me I must conference.
      <0wnsj00> oh jeez /kill ok?
      *** 0wnsj00 is now known as yomamabinladen
      <bonglord> LOL
  • Why? (Score:2, Interesting)

    by k3vmo ( 620362 )
    Why aren't such CD's outlawed? I mean, contries go after drug suppliers... why not go after those supplying an individuals email address?
    • Re:Why? (Score:5, Insightful)

      by allism ( 457899 ) <alice.harrisonNO@SPAMgmail.com> on Friday January 02, 2004 @02:35PM (#7861593) Journal
      You can't PROVE intent with one of these CDs. If I have a pound of marijuana on my kitchen table, the odds are good that someone is gonna use it in an illegal manner. It's not illegal to have e-mail addresses, though, because they can be used for something legitimate (i.e. research, as the author of the article did).
      • Re:Why? (Score:4, Funny)

        by Kenja ( 541830 ) on Friday January 02, 2004 @02:41PM (#7861641)
        "If I have a pound of marijuana on my kitchen table, the odds are good that someone is gonna use it in an illegal manner."

        I swear officers, I was just going to use it for making cookies. What? You mean thats illegal too? Dang it, now how am I going to be able to sit through the Matrix trillogy!

      • by gosand ( 234100 ) on Friday January 02, 2004 @04:01PM (#7862392)
        If I have a pound of marijuana on my kitchen table, the odds are good that someone is gonna use it in an illegal manner.

        Those odds approach 1 at the speed of light if you send me your address and you are within 100 miles of where I live.

  • by mekkab ( 133181 ) * on Friday January 02, 2004 @02:31PM (#7861556) Homepage Journal
    That's right, E-mail is the best way to advertise your product. IF you send me $300 USD I'll give you a CD packed with email address that have been generated using the latest technology. The /dev/random method is world reknown for unique addresses with no repeats. I gaurantee that they are ALL ORIGINAL email addresses!

    And if you act now, I'll send you the /dev/null E-mail address CD at no additional charge!
    • please send the CD to /dev/null ASAP.
    • by wytcld ( 179112 ) on Friday January 02, 2004 @02:36PM (#7861595) Homepage
      The /dev/random method is world reknown[ed]

      You joke, but this algorithm was sufficient for human evolution. (Hmm, spam as sperm?)
      • You joke, but this algorithm was sufficient for human evolution. (Hmm, spam as sperm?)

        Right, but that took millions of years. Maybe in that amount of time /dev/random WOULD churn out a bunch of helpful addresses.
        • It's all in the selection process. For humans (and other life forms), only the DNA of the ones that survive long enough to reproduce gets selected. You end up with mostly good DNA.

          If you filtered /dev/random addresses through a selection process (run an SMTP check) you'd end up with good addresses. To speed up the process, generation random mutations in known good addresses and test those. (Which is indeed what some spammers do, they just skip the test phase.)
      • (Hmm, spam as sperm?)
        Increase your orgasm now!!!!kjg098790a
      • You can't use a theory as basis for such a statement. There are many other theories out there that can explain human evolution in the given amount of time much better than the /dev/random theory.

  • No surprises here (Score:5, Insightful)

    by John3 ( 85454 ) <john3NO@SPAMcornells.com> on Friday January 02, 2004 @02:35PM (#7861588) Homepage Journal
    Is anyone surprised that the 10 million promised addresses boils down to less than 7 million after removing duplicates? The article is interesting in terms of statistical analysis of the data (especially the fact that a number of abuse and postmaster addresses are in the email database), but I don't think anyone expected quality email lists from spammers.

    On the other hand, why would someone sending spam care too much about the integrity of the data? You're still getting over 6 million email addresses. So several million messages bounce...does the spammer care?
    • Does the spammer care? There is a principle here. What kind of a world do we live in when a spammer cannot trust another spammer? Is there no honor even amongst thieves? A spammer who is willing to cheat another spammer cannot move any further down on the food chain. This is the last straw. Perhaps its time to start boycotting spammers! As hard as it is to delete those penis enlargement emails it is time to take a stand.
    • by oobar ( 600154 )
      In my opinion it's no mistake that the product this spammer was selling was of very low quality. Spammers' best resources are their lists. If you could shell out 50 or 300 Euros (or whatever he said the price was) and get a quality list of 100% valid, working, non-role email accounts then suddenly the value of all those lists just went down. In other words, if you're going to sell these CDs it's in your best interest to include the lowest-quality data that you have available. I'm sure there are some idi
  • by bc90021 ( 43730 ) * <`bc90021' `at' `bc90021.net'> on Friday January 02, 2004 @02:35PM (#7861591) Homepage
    Any CD that is sold containing email addresses invariably has some that work, but the vast majority are just generated. I once knew someone (and I no longer communicate with that person) who insisted that spam was the only way to sell his products. He paid $400 to some marketing company, and they sold him a CD with a million addresses. He asked me to look at it, and my conclusions were that he got ripped off. He didn't want to believe me, but the sheer number of addresses that were obviously generated proved to me that someone had written a quick script to create addresses. A good portion of the addresses were also old-school, with lots of "71532.4532@compuserve.com" type addresses.

    Spammers aren't just evil for selling addresses, they are evil for making up about 3/4 of the ones that they do sell, and anyone who buys a CD with email addresses on it should be aware of that.
    • It seems like it would be fairly easy to write a script that creates believable addresses. If you were to use a domain like AOL, there's a good chance you very well could end up with real addresses.

      Spammers are evil for everything they do.

  • by Anonymous Coward on Friday January 02, 2004 @02:36PM (#7861596)
    Bulletproof hosting in India? Gee, now I know what we can do with the variety of Kevlar-penetrating bullets in the US. Maybe your servers can survive a Slashdotting, but can they survive a barrage of 7.62mm armor-piercing bullets? I think not.

    And if there are a few bullets left over, I'm sure someone can come up with some creative spammer-related uses for them...
    • by Patrik_AKA_RedX ( 624423 ) on Friday January 02, 2004 @02:50PM (#7861720) Journal
      And if there are a few bullets left over, I'm sure someone can come up with some creative spammer-related uses for them...
      We could use them to answer a few very important questions:

      Are piranas dangerouse to humans?

      Can nude people survive on the North Pole?

      Is there really no air in space?

      Is smoking in a gasoline filled room dangerous?

      Can humans conduct electricity between high voltage lines?

      Can people really live inside a whale?

      If an anvil is droped on someones head, does he really see birds and stars flying around his head?

  • Spam in Europe (Score:4, Informative)

    by Tirel ( 692085 ) on Friday January 02, 2004 @02:38PM (#7861612)
    Well, I heard only a week or so ago that the European Union was going to make sending spam illegal in the near future, or has already done so.

    Unfortunately, as this article [theregister.co.uk] on the Register points out, most spam comes from outside of the EU, or turns out to be untraceable anyway... so the question is if this new legislature would have any noticeable effect.

    A quote: Anti-spam software outfit, Brightmail, says the legislation only affects European registered companies and they're unlikely to flout the legislation. However, it claims nine out of ten spam emails are either untraceable or come from operations outside the European Union. Either way, professional spammers - whether inside or outside the EU - are unlikely to heed the new legislation. So in effect, this new law will make bugger all difference to the amount of spam we get in Europe.

    IMHO this new law certainly is a step in the right direction, since the ISP's would be legally obliged to take action against spammers on their network. Now if only the rest of the world would go in the same direction...
    • Re:Spam in Europe (Score:3, Interesting)

      by simetra ( 155655 )
      Untraceable? Why not just pretend to be a customer, even buy the product, then bust them? Surely during the process of patronizing a spammer, you'll get their identity, address, etc.???

    • most spam comes from outside of the EU, or turns out to be untraceable anyway... so the question is if this new legislature would have any noticeable effect.

      So, for the purposes of legislation, maybe the answer is to divide spam into two categories.

      First category would be random junk, with no real product, or with no realistic way to reach the purveyor of said junk. It happens, you can't do much about it, let it slide.

      Second category, however, would be the spam advertising a real product/service, with s

  • by TheVidiot ( 549995 ) on Friday January 02, 2004 @02:39PM (#7861625) Homepage
    can they also please test one of those penis enlargement pills? I'd like to know if they work...

  • what would happen if a spammer got a cd with their own email address in it 14 times?? that could be funny.
    • Re:I wonder (Score:2, Insightful)

      by Anonymous Coward
      Spammers put email addresses in thier own lists and lists they sell. The first is so they know how far through thier software is in spamming out. The second is so they know who is distroing thier email list without approval.
      • Re:I wonder (Score:3, Insightful)

        by pla ( 258480 )
        The second is so they know who is distroing thier email list without approval.

        To accomplish what, sue the person selling the list?

        To sue someone, you need to exist, and provide contact information. Considering that the linked article basically states that this CD of supposedly valid and unique email addresses amounts to little more than false advertising (and for the purpose of something that counts as a crime in an increasing number of places), only an idiot would out themselves over $60.

        More impor
  • A governing body that only cares about serving big business and not its citizens.

    Email used to be a good tool for keeping in touch with people before spam. It's probably more useful for individuals than many businesses.
  • "Unregular syntax" (Score:5, Informative)

    by aridhol ( 112307 ) <ka_lac@hotmail.com> on Friday January 02, 2004 @02:42PM (#7861652) Homepage Journal
    He refers to addresses ending with a dot as "unregular syntax", then later as "no TLD". However, the address with a trailing dot is the canoncial form of a domain name - the final dot refers to the "root" domain, the one that Verisign gets to play with.
    • by r1ch ( 166865 )
      To be fair he also says "The addresses ending in one dot are technically valid adresses. If handled correctly by the software that is used, they should cause no problems. However, when sending bulk e-mail your goal would be to reach as many as possible and one would prefer to play at safe."
  • by Powercntrl ( 458442 ) on Friday January 02, 2004 @02:43PM (#7861656) Homepage
    ...AOL CDs, Compuserve CDs, Prodigy CDs, Earthlink CDs. Now I just get AOL CDs.

    What I really miss are the days of spam floppies, now I never seem to have a floppy when I need one.
  • Priceless (Score:5, Funny)

    by smoking2000 ( 611012 ) <linuxminded@gm[ ].com ['ail' in gap]> on Friday January 02, 2004 @02:44PM (#7861669)
    One of the email addresses on the CD: ikautostelen@van.jouw
    which translates from dutch to english to something like: me-steal-car@from.you
  • by psycho_tinman ( 313601 ) on Friday January 02, 2004 @02:46PM (#7861685) Journal

    Yes, its great that people embed "remove-this" and so on into their email addresses at Slashdot and other places (like Usenet), for example to make it harder for bots to parse and detect valid email addresses..

    But one wonders if tools cant easily be written to remove basic patterns of that sort ... a simple substitute (or regex, whatever) would cleanse quite a few addresses, especially on UseNet..

    Why is this worth it ? playing devils advocate, if I wanted to market ThinkGeek-like toys, Slashdot readership would be squarely in my "target market". A bit of effort cleansing addresses would pay off (because presumably, a fair portion of the populace reading Slashdot have more disposable income to spend on toys and geeky appliances ? ) and thus the spam would be more "directed" ?

    Along those lines, how much longer before someone just hires a highschool kid to manually "collect" addresses ? (a few bucks an hour payment, say).. all the fancy email obfuscation tricks would fly out the window then..

    It all depends on the payment model for spammers (which I never could understand anyway..). Paid per email sent (with incentive to forge or do shoddy cleansing), or paid per items bought ? If its per item, then there is a good incentive to cleanse, I'd think..

    • Why is this worth it ? playing devils advocate, if I wanted to market ThinkGeek-like toys, Slashdot readership would be squarely in my "target market". A bit of effort cleansing addresses would pay off (because presumably, a fair portion of the populace reading Slashdot have more disposable income to spend on toys and geeky appliances ? ) and thus the spam would be more "directed" ?

      If your business model depends ot targetting spam at people who hate spam enough to obfuscate their e-mail address, you are no

    • But one wonders if tools cant easily be written to remove basic patterns of that sort ... a simple substitute (or regex, whatever) would cleanse quite a few addresses, especially on UseNet..

      They probably can. And they are probably already in use by some spammers. No big deal here.

      Why is this worth it ? playing devils advocate, if I wanted to market ThinkGeek-like toys, Slashdot readership would be squarely in my "target market". A bit of effort cleansing addresses would pay off (because presumably, a f

  • by amichalo ( 132545 ) on Friday January 02, 2004 @02:47PM (#7861690)
    I can't stand spam and won't use it in business practices, but I don't thin kit should be any more illegal to sell a CD with aggregated e-mail address than it should be to sell a phone book CD with telephone numbers. There is value added in the indexing and providing of tools to manage so many addresses.

    What should be illegal is selling generated, known to be false, addresses. This is basically false advertising.

    What should also be illegal is bulk mailing to people who do not subscribe to a service. We need better mail servers that optionally require a "key" to receive mail, otherwise it goes straight to "File 13".

    Sadly, all this bulk mail, even if "bounced" back to the sender, uses tons of bandwidth and is ultimately a tremendous waste of everyones time.

    Unfortunately, all this Spam would stop is people STOPPED BUYING FROM THE SPAMMERS, but even if 0.0001% of recipients say "yeah, I DO want a larger ... organ" and patronize the spammer, then the spam will continue.
    • but I don't thin kit should be any more illegal to sell a CD with aggregated e-mail address than it should be to sell a phone book CD with telephone numbers

      I agree with the rest of your post. This part seems a bit forced if you think about this reality that we come across:

      When searching for a long lost friend, it is nearly impossible to find a phone number, or a working email address, and sometimes phonebooks list only partial names. Also, chances are that any user of a plain-old phone book will find a S

  • by mpath ( 555000 ) on Friday January 02, 2004 @02:50PM (#7861721)
    Pointing out spammer's mistakes and helping them evolve/correct the problem.
  • Do me a favour (Score:5, Interesting)

    by skinfitz ( 564041 ) on Friday January 02, 2004 @02:52PM (#7861732) Journal
    Edit the CD to include the email address of every politician the wolrd over, along with known spammers and the editor of every media outlet. If you can, use addresses that forward a notification to their mobile phone via SMS, then sell the new CD.

    We'll soon see a change in the law.

    Ahh I can dream.
    • Re:Do me a favour (Score:4, Insightful)

      by Tim C ( 15259 ) on Friday January 02, 2004 @03:42PM (#7862239)
      We'll soon see a change in the law.

      Yes - to make intentionally submitting the email addresses of such people to spammers illegal. Hell, they can probably swing it as a terrorist act - interfering with the democratic process, distributed dos attack on their email, etc.
  • by tuxette ( 731067 ) * <tuxette.gmail@com> on Friday January 02, 2004 @02:53PM (#7861753) Homepage Journal
    ...from Norway...

    Over here, the rule is opt-in. The recipient of the spam has to have consented to it beforehand. (for the Norwegians here - markedsforingsloven 2 b).

    I used to have a job where I had to deal with different kinds of questions from the public that dealt with, among other things, spam. After contacting various Norwegian spammers to lay down the law, I found that a lot of them bought CDs or whatever with e-mail addresses. They seemed to (usually arrogantly) think that because they bought these lists, they were fully legal to use. This is not the case.

    I don't know if these CDs were sold with the implication that their use was legal. Hindsight is 20-20 and I realize now I should have told these spammers to demand their money back from the people who sold them the CDs.

    • by Kjella ( 173770 ) on Friday January 02, 2004 @04:32PM (#7862690) Homepage
      ...over the years I've recieved exactly TWO Norwegian spams - from "Trondelag Teater" and "freewave.no" Of course, I'm pretty careful with my "official" mail, I keep various other junk accounts for other stuff. But the US spam (presumably) keeps coming in, viagra, 411 scams, mortgages, gambling, whatever. They still fill up my inbox.

      I think the only way to do it is to have
      a) hashcash payments (CPU time) OR
      b) cryptographic pass-through "token"

      The former for all the low-volume mail, where you can "afford" to burn a little CPU. The latter for mailing-lists and similar high-volume stuff, which would allow it through without paying any hashcash, but must be specifically issued (by the server, at the user's request).

      The server wouldn't need to keep a database of them, it would simply have to verify them. Yes, this is my own signature, a valid user@mydomain.tld token with the name "Slashdot". They could also be time-limited. Furthermore, the token email address should be different from the non-token email, so that I can issue them "anonymously". (e.g. the SHA hash of the real email...)

      Compromised token? Reject any further mail from that token, preferably at server (revocation database, wouldn't be that large). By default, mailing lists should take a rejected token as an "unsubscription".

      That would also allow for degrees of "blocking", not simply black&white lists.... these semi-spammy domains get higher hashcash, these highly no-spam areas get lower hashcash.

      So how would this work. Let's say I want to sign up for a slashdot newsletter:

      Subscribe
      1. Send subscription email to server, check box for "Issue token", and call the token "Slashdot".
      2. Server recieves requests, generates a cryptographic token, and sends it to the list from the TOKEN address (say e.g. a hash of the real email, server has a hashmap).
      3. Server recieves mail from mailing list, looks up real email based on token, verifies token, and pass it on (with proper "X-Token" header or soemthing like that). Replies to messages with an X-Token also sent over token address.

      Unsubscribe (either due to compromised/SPAM/leaving list):
      1. Revoke token
      2. Mailing list tries to send mail, but fails on invalid token. Removes you from list. They could try again but the result would be the same.

      What information does slashdot have now? Nothing. No valid token, no valid address. No matter how hostile/compromised they got, they can't do any more damage. They can't even sell my real address to spammers.

      Having removed all "high-volume" automatic lists from the equation, we can jack up the hashcash requirement high enough that it really hurts spammers. You can finally have a SPAM policy without directly rejecting mail.

      Hell, you could even have a two-stage hashcash deal. One based on origin (before wasting bandwidth) and one after retrieving mail and passing it through spam-assasin, with higher hashcash the more "spammy" the mail is (wasting bandwidth, but saving space in inbox).

      The only ones hurt by this are those sending mass amounts of unsolicitated mail. Which are, in approximately 99,99% of the cases, spammers. If it isn't, it's mass requests to sign "save futurama/the rainforest/whatever" campaigns or similar. That much collateral damage, I'm willing to take.

      Kjella
  • by StarkII ( 29864 )
    I think the assumption that they are maliciously giving out bad e-mail addresses overstates their intelligence. It is more likely that they just don't know what they are doing. But...thanks to this wonderful (and free) tutorial, they can now vastly improve their own spam e-mail lists! The tutorial was even kind enough to provide the appropriate regex patterns at the bottom. How Thoughful.
  • by strelitsa ( 724743 ) on Friday January 02, 2004 @02:55PM (#7861768) Journal
    "Millions" CDs are nothing new under the sun. Spammers have been using "dirty" lists since ARPANET days, and they merely turn "just hit delete" sheeple into raving anti-spam activists.

    As for the author's assertion that the "bulletproof" spam hosts are in India, I give you ... China, Brazil, most of the Pacific Rim, as well as clueless/malicious providers such as Level3, Wanadoo.fr, etc. I can count the number of spams I've received from Indian sources recently on one hand, while the Chinese/Brazilian spam numbers in the tens of thousands.


  • We offer reliable bulk email friendly web hosting services. You can now have the
    peace of mind knowing that your web site is secure during your email marketing
    campaigns.

    [...]
    You can use the server for any of the following:

    Direct Bulk Mailing or Proxy Mailing
    Web Site Hosting
    Proxy, Relay or Port Scanning



    If only there was some way to deprive "ContactHosting@tom.com" of peace of mind
  • From the linked article, they found 10,996,629 total addresses, with 6,220,454 unique addresses. 56% unique, by the numbers presented.

    So could someone explain how, with 56% of them unique, only 1,795,633 addresses appear only once on the list? Does appearing "1 time" not mean the same thing as "unique"?

    I though perhaps those numbers might mean "once more than unique", but that still doesn't add up - Just looking at the "1 time" and "2 times" columns, I see 1,795,633 + 4,107,246 = 5,902,879, while 10,9
  • Not a complete solution, but doesn't a valid WhoIs record make spam-killing easier and more practical? Doesn't registering a DNS domain require a valid WhoIs record (at least in theory)? It seems systematic verification of the existing WhoIs records, with consequences like loss of registration for unreachable or deceptive offenders, would help. This could even be done on an open source basis by volunteers. We scan the publicly available WhoIs database, find what we think are invalid records and flag the
    • Sure, I also find it annoying when some spammer has a GoDaddy privacy-protecting address, or is registered with email contact address: SkriptKiddie@hotmail.com, snail-mail 1600 Pennsylvania Ave, phone 1-900-spam-you. But "valid" addresses don't solve that problem - one spammer I traced yesterday has a street address that's identical to The Company Corporation [corporate.com], which for the last 105 years has been the canonical simple low-priced way to set up a Delaware corporation, and their phone number was an answering
  • Great Tutorial (Score:2, Interesting)

    by StarkII ( 29864 )
    I find it doubtful that the erroneous e-mail addresses are malicious. That would suggest that these spammers have vastly higher intelligence they evidence indicates.

    But...thanks to this new and wonderful tutorial, they can vastly improve the quality of their spam e-mail lists. The tutorial was even kind enough to provide the appropriate regex patterns at the bottom. How thoughtful
    • Re:Great Tutorial (Score:5, Insightful)

      by vidarh ( 309115 ) <vidar@hokstad.com> on Friday January 02, 2004 @03:59PM (#7862375) Homepage Journal
      Yeah, because finding this information is so incredibly hard, and would have taken the spammers a whole hour or two of intense work, so of course that's why they haven't done it.

      If you think this will make a difference in the quality of the lists, think again. These people are more interested in volume than quality, or they wouldn't have spent time on spam in the first place.

      The more unsophisticated spammers don't really care about the list quality, as they'll just keep accumulating addresses since sending out the mails cost them next to nothing anyway. The sophisticated spammers are more likely collecting their own lists.

      And the people selling these lists have every interest in inflating the number of addresses as much as they can get away with from their prospective customer base.

  • Part of me is wondering if this is necessarily a bad thing. Why not sell CD's containing bogus addresses to "poison the well" of spammers as it were? The ideal situation would be one in which 1.) every address was invalid, and 2.) the spammers paid for every bounce via bandwidth charges.

    To be honest, this might be the most effective way of reducing spam. Simply register a large number of TLD's with the same IP address, make up bogus email addresses using said TLD's, and sell it on CD. Use the money

  • by Grond ( 15515 ) on Friday January 02, 2004 @03:04PM (#7861869) Homepage
    Syphilis, hopefully. :)

    /obvious
  • the master plan (Score:4, Interesting)

    by Tumbleweed ( 3706 ) on Friday January 02, 2004 @03:27PM (#7862095)
    Okay, set up a site for potential spammers to buy one of these CDs. Require they give correct contact information to purchase.

    Once lots of them have purchased, send out the CDs with the list of people who purchased the CD.

    Profit and the joy of justice, all in the same business plan!

    "Oh yeah."
    - The Duffman

    "Evil's no good. Ya just don't cotton to it. You've gotta whack it on the nose with the rolled-up Newspaper of Justice, and say, 'Bad dog...bad dog!'"
    - The Tick (as best I can remember)
  • by simetra ( 155655 ) on Friday January 02, 2004 @03:34PM (#7862154) Homepage Journal
    Have a key that is like a public key, but isn't published to the world; only give it out to people from whom you authorize email to be delivered to you. If your incoming mail doesn't contain that key, delete it.

    Then, have a specifically formatted message type to handle key requests. Say if Betty wanted to email Veronica to request her private-public key, it would have to be in a strict format, say with the subject line: KEYREQ . For example: KEYREQ veronica@archie.com Hi it's veronica. ?? Then your email client could have a button called "Reply/Authorize".

    • by Crypto Gnome ( 651401 ) on Friday January 02, 2004 @05:35PM (#7863239) Homepage Journal
      Of course you've just completely ignored the core problem with SPAM.

      By the time I've received an email, ie downloaded it to my local machine, it has just polluted (ie stolen/consumed the resources of)
      • my cpu
      • my disk
      • my bandwidth
      • the ISP mailserver cpu
      • the ISP mailserver disk
      • the ISP bandwidth
      • the ISP bandwidth of every ISP it transits to get across 'the internet' to me
      So, tell me again how your "solution" actually solves *any* problem?

      Repeat after me the problem with spam is *NOT* that we're unable to recognise it for the SPAM that it is.

      The problem with SPAM is the resources it steals from me and all the ISPs.

      Face it people, SPAM is THEFT, inbound SPAM steals resources from me, and resources from my ISP. In the end, I (the consumer) pay for that theft (eg increased internet access costs etc).
  • by Anonymous Coward on Friday January 02, 2004 @03:41PM (#7862223)
    Type "bulletproof hosting" into Google and you get lots of hits advertising "bulker friendly" and "assistance with spamming -- we do more than just give you a place to send from" sites.


    Why aren't these sites listed, real-time blacklisted, and DDoS'd by the good guys? If there is a SETI screensaver, why not a Pitchforks-and-Torches (my name for the angry mob of ordinary folks) one that, say, once a minute sends a query to known spam-friendly ISPs. A million of these would be a million messages a minute. Hard to call that a real DDoS attack from any one person since all I wanted to see if their page has updated.

  • Whitehat CD (Score:4, Interesting)

    by hey ( 83763 ) on Friday January 02, 2004 @04:34PM (#7862704) Journal
    How about this... some whitehat could make and market a CD of millions of mail addresses. But they'd all be fake except a few for monitoring, spamer tarpits and a few of abuse@ISP and the feds ;-)

    Besides cutting down spam you'd be tranfering month
    directly from the spammers to yourself.
  • by Anonymous Coward on Friday January 02, 2004 @05:49PM (#7863361)
    The entire analysis boils down to one thing, which I call Rule #5, the King of All Rules: Spammers don't give a shit.

    They don't care who you are, what you think, what you would or would not like to receive, what sex you are, if you are a minor or not, if the address they are sending to is valid or malformed, or if you are dead. All the lying that they do and the rationalizing of their behavior exists soley because -- lets chant together -- "Spammers don't give a shit"

    The notion that a spammer should clean up a spamming CD to remove duplicate addresses or to remove role addresses at ISPs is simply ridiculous. Why spend the time? It will have zero impact on the number of sales that they make and -- chant it -- spammers don't give a shit.

    So forget all the other rules. It is a waste of time to assign qualitive analysis to the behavior of sociopaths. They want money, and they don't give a shit about how they go about doing it. Once you realize that, you will see that all the other "Rules" for spammers are superfulous and stem from Rule #5.
  • by IBitOBear ( 410965 ) on Friday January 02, 2004 @06:57PM (#7863818) Homepage Journal
    I really don't know why this is so hard for people to understand, but it "shouldn't" be that hard to create a peer-to-peer, fully trusted spam blacklist system.

    1) Take a well known provider of such lists and have him generate himself a PGP/GPG (etc) key.

    2) Create a hashing algo that can be applied to email addresses and domain names and produces (about) 60 or so distinct hashes.

    3) Coordinate the email blacklists into N files where N is the number of hash results from item 2. These are the N components to the complete list. IF you have an address X and its hash is Xn then if the address doesn't apear in file N the address isn not blacklisted.

    4) Construct (or use an existing) P2P app to distribute these N files. Ideally the P2P system in question can "bias" the fetch operation to favor retrevial from "previously known good" sources.

    Here are the fine points:

    A) The GPG secret key, and not the "location fetched from", is the magic that marks the list valid. You can not DDOS a secret key, just an originator.

    B) A first-order web of trust, instead of a simple key, could also be used. That is, instead of requiring a signature from the master key, require a signature from a key signed by the master key. This way "the one key" can stay relatively unused while persons need to attack the rotating and regularly expiring frontage keys if they want to game the transfer for any reason.

    C) The master key and the frontage keys don't have to equate to any real nor active network facility. They only need to be unique in key space. You simply *CANNOT* attack a namespace that isn't backed up by a physical facility. (For instance, if the master key were "master@control.spamcop.org", spamcop.org itself could be pointed at Geocities or something or nothing at all.)

    D) While a current (Kaza-esque) P2P app would probably be less than ideal for the actual transport, it wouldn't be dificult to design a P2P style distribution mechanisim. It wouldn't need to be any more subtle than a bunch of http mirrors really, as long as the mirroring system (rdist/wget alike) would only put the files in the public directory if they passed a frontage-key/master-key signing test.

    In practice you would probably want to distribute a signed known-mirrors (root) file too.

    [Then again, a shite load of ptr records in a "spamcop.org" dns table could function as the analog of an MX table for this rooting purpose. Those sites would tend to become targets, but only for as long as the list size were small.]

    If a "real" P2P app, or even a well designed friend-of-friend http-based network were put together and reached a core complexity of a at least a couple dozen known base points, it would be unquenchable. The target density would be too diverse to attack effectively. It would be like trying to DDOS "all the bloggers on the net".

    Heck, set a pseudo standard: Every doman that wants to join the P2P network "backbone" should issue itself a "spamcop@my.domain" key and then do a challenge/response signing (on connection each party sends the other a challenge, gets the challenge back signed, checks the signature as valid) when it comes onto the backbone. Organize the thing like IRC but with records kept for keys used. Add some throttling (like IRC flood protection) and you are off. Abusers can be tracked down to their hosts and keys.

    Then you can devolve. Regular users don't have to have keys to join the net and request information. Keys and domains can be blacklisted (possibly together?).

    Heck, use the haxors techniques. Actually get permission to stake out some IRC channels to act as the root seed broadcast-style distribution system (list of known good core hosts, again, such lists are signed).

    All you have to do is get some distribution without losing authenticity. That is what public keys are all about. The anti-assailable nature of P2P and the semi-chaotic nature of IRC have their legitimate purposes. Now all you need is to use these systems for good instead of evil.

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...