A Look Into How Spammers Spam

from the zombie-machines:-the-choice-of-a-new-generation dept

Nothing all that surprising here, but some anti-spammers have managed to get themselves into the various "spam clubs" where top spammers trade tips with each other. From that they've learned, as we all pretty much knew already, that the state of the art in spamming is using compromised machines that have had a trojan installed on them. Lists of such controllable machines are offered to other spammers, both for additional spamming capabilities and for denial of service attacks. Basically, the spammers have built up quite a distributed super computer - and those contributing cycles and bandwidth don't even know about it.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Oliver Wendell Jones, 14 May 2004 @ 12:34pm

    But...

    Although it hurts my brain to do so, I can twist my perspective just enough to see how some deranged individuals could consider what they do to be semi-legitimate marketing, but...

    If you have to make use of compromised PCs that don't belong to you and use up bandwidth that someone else is paying for, how do they justify that to themselves? Or don't they even care?

    link to this | view in thread ]

  2. identicon
    thecaptain, 14 May 2004 @ 4:09pm

    Re: But...

    There's not a spammer in the world who believes his methods are legitimate.

    You nailed...they have to resort to a crime (yes, in most countries, using/accessing a compromised PC is a crime)

    When can we start making SPAM a crime? Anyone caught using these methods should face hefty jail time.

    link to this | view in thread ]

  3. identicon
    Anonymous Coward, 17 May 2004 @ 8:12am

    Re: But...

    yes,
    the prison system is not full enough and we must put this hideous transgression behind bars.
    Not only can I waste time deleting their crap, I can spend my tax dollars keeping them in jail.

    spam is a nuisance but it hardly constitutes a crime. Using compromised computers already falls under the category of fraud & misappropriating equipment, which is already a crime.

    More laws don't work 'captn

    link to this | view in thread ]

  4. identicon
    Bill, 17 May 2004 @ 8:39am

    Re: But...

    I personally am a lot more offended by spammers than heshers. Maybe if we let loose a few of the harmless potheads we'd have room for people who are a real threat to the public order.

    link to this | view in thread ]

  5. identicon
    Anonymous Coward, 17 May 2004 @ 1:13pm

    No Subject Given

    Most spam can be traced back to servers within the Hormel factories and distribution centers.

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.