E-mail harvesters hit with $1B antispam lawsuit
The lawsuit was filed on behalf of Project Honey Pot
Computerworld - A $1 billion lawsuit filed today promises to open up a new front in the battle against spam: It targets not just spammers, but -- for the first time -- also those responsible for harvesting e-mail addresses on behalf of spammers.
The lawsuit, filed in the U.S. District Court in Alexandria, Va., is one of the largest of its kind and is being filed on behalf of Project Honey Pot members in over 100 countries. Project Honey Pot is a service provided by Park City, Utah-based antispam company Unspam Technologies Inc.
"If you've harvested e-mail addresses or sent spam in the last two years, chances are you're on our radar screen, and we're coming after you," a note posted on the Project Honey Pot Web site said today.
"This lawsuit is unique because we believe it is the first major case in the United States to bring a claim against spammers for harvesting e-mail addresses," the note said. "While this practice has been a penalty enhancement under the CAN-SPAM Act since it was passed, in most cases the data was not available in order to prove an address was harvested."
Project Honey Pot bills itself as a system for identifying spammers and the so-called spambots used by e-mail harvesters to scrape addresses from Web sites. Web site owners can install honey pot software on their sites that allows them to identify spam, as well as when the e-mail was sent to was harvested by the spammer -- and the IP address of the harvester.
The defendants in the case are the "John Does" responsible for e-mail harvesting and spamming, Praed said. "Spammers are very good at hiding themselves," he said. "But what they can't hide are the data points that they use [for spamming]. We have got a lot of those data points."
Among the terabytes of data Project Honey Point has collected are more than 6 million unsolicited e-mails, 2.5 million IP addresses from which spam was sent and about 15,000 IP addresses belonging to e-mail harvesters.
The data will allow the plaintiffs to ask the court to subpoena Internet service providers for the identities of the owners of some of these IP addresses, Praed said. "We are going after the largest targets. The discovery will focus on the big fish," he said. "Some of these guys have made a big mistake. They have failed to use anonymity. If you are going to commit an Internet crime, everything has to be anonymous."
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts