Blue Security waves white flag
The antispam firm is shutting down operations after crippling spam attacks
Computerworld - Antispam company Blue Security Inc. yesterday said that it is ceasing operations after a crippling series of attacks launched against its services earlier this month by a Russian spammer named PharmaMaster.
The episode serves as an alarming reminder of the challenges involved in dealing with spammers and the resources they have at their disposal to deter those trying to stop them, analysts said.
In a statement yesterday, Blue Security, whose U.S. headquarters are in Meno Park, Calif., said it can no longer "take the responsibility for an ever-escalating cyberwar through our continued operations.
"As we cannot build the Blue Security business on the foundation we originally envisioned, we are discontinuing all of our antispam activities on your behalf and are exploring other, non-spam-related avenues for our technological developments," the company said.
The decision comes only days after Blue Security restarted operations following a massive and sustained denial-of-service (DoS) attack launched against it by PharmaMaster earlier this month.
Blue Security operated a fairly controversial antispam service designed to deter junk-mailers by spamming them back. Blue Security's Do Not Intrude program allowed individuals to register their e-mail addresses with the company and essentially flood spammers who sent them e-mail with automated opt-out requests.
Since the free service was launched on a trial basis last summer, Blue Security claimed to have signed up more than 500,000 subscribers -- including corporate customers -- and had gotten six out of the top 10 spammers to abide with their opt-out lists.
But the speed at which the company folded following the DoS attacks suggests that it was ill-prepared to deal with the consequences of attacking spammers directly, said Todd Underwood, chief operations and security officer at Renesys Corp., a Manchester, N.H.-based Internet monitoring company.
"Spammers have a history of launching massive attacks against those who try to stop them," Underwood said. While others have taken precautions against such attacks by building more redundancy into their networks, Blue Security appears to have been "woefully underprepared for the things that happen when you attack spammers," he said.
More importantly, the incident is an alarming reminder of how the vast botnets available to spammers for sending bulk e-mail can be easily used to launch devastating attacks, said John Levine, chair of the Internet Research Task Force's Anti-Spam Research Group.
The attacks against Blue Security caused serious disruptions for five service providers that were hosting the company's servers. It also interrupted service at Toronto-based Tucows Inc., a major provider of core domain-name system services. Thousands of blogs being hosted by San Francisco-based Six Apart Ltd. were also knocked off-line after PharmaMaster launched a DoS attack against a server hosting a Blue Security blog. In an interview following the attacks, company CEO Eran Reshef said the attacks appear to have been carried out with the help of someone within a large Internet service provider.
The fact that this sort of disruption can be caused because of a "grudge match" between two people is scary, Levine said. "It points to a fundamental security weakness of the Internet," Levine said. With spammers operating at will from a number of countries, the issue of stopping them is something that people are going to have to think about from both a legal and technical standpoint, he said.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts