Blue Security waves white flag
The antispam firm is shutting down operations after crippling spam attacks
Computerworld - Antispam company Blue Security Inc. yesterday said that it is ceasing operations after a crippling series of attacks launched against its services earlier this month by a Russian spammer named PharmaMaster.
The episode serves as an alarming reminder of the challenges involved in dealing with spammers and the resources they have at their disposal to deter those trying to stop them, analysts said.
In a statement yesterday, Blue Security, whose U.S. headquarters are in Meno Park, Calif., said it can no longer "take the responsibility for an ever-escalating cyberwar through our continued operations.
"As we cannot build the Blue Security business on the foundation we originally envisioned, we are discontinuing all of our antispam activities on your behalf and are exploring other, non-spam-related avenues for our technological developments," the company said.
The decision comes only days after Blue Security restarted operations following a massive and sustained denial-of-service (DoS) attack launched against it by PharmaMaster earlier this month.
Blue Security operated a fairly controversial antispam service designed to deter junk-mailers by spamming them back. Blue Security's Do Not Intrude program allowed individuals to register their e-mail addresses with the company and essentially flood spammers who sent them e-mail with automated opt-out requests.
Since the free service was launched on a trial basis last summer, Blue Security claimed to have signed up more than 500,000 subscribers -- including corporate customers -- and had gotten six out of the top 10 spammers to abide with their opt-out lists.
But the speed at which the company folded following the DoS attacks suggests that it was ill-prepared to deal with the consequences of attacking spammers directly, said Todd Underwood, chief operations and security officer at Renesys Corp., a Manchester, N.H.-based Internet monitoring company.
"Spammers have a history of launching massive attacks against those who try to stop them," Underwood said. While others have taken precautions against such attacks by building more redundancy into their networks, Blue Security appears to have been "woefully underprepared for the things that happen when you attack spammers," he said.
More importantly, the incident is an alarming reminder of how the vast botnets available to spammers for sending bulk e-mail can be easily used to launch devastating attacks, said John Levine, chair of the Internet Research Task Force's Anti-Spam Research Group.
The attacks against Blue Security caused serious disruptions for five service providers that were hosting the company's servers. It also interrupted service at Toronto-based Tucows Inc., a major provider of core domain-name system services. Thousands of blogs being hosted by San Francisco-based Six Apart Ltd. were also knocked off-line after PharmaMaster launched a DoS attack against a server hosting a Blue Security blog. In an interview following the attacks, company CEO Eran Reshef said the attacks appear to have been carried out with the help of someone within a large Internet service provider.
The fact that this sort of disruption can be caused because of a "grudge match" between two people is scary, Levine said. "It points to a fundamental security weakness of the Internet," Levine said. With spammers operating at will from a number of countries, the issue of stopping them is something that people are going to have to think about from both a legal and technical standpoint, he said.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts