E-mail harvesters hit with $1B antispam lawsuit
The lawsuit was filed on behalf of Project Honey Pot
Computerworld - A $1 billion lawsuit filed today promises to open up a new front in the battle against spam: It targets not just spammers, but -- for the first time -- also those responsible for harvesting e-mail addresses on behalf of spammers.
The lawsuit, filed in the U.S. District Court in Alexandria, Va., is one of the largest of its kind and is being filed on behalf of Project Honey Pot members in over 100 countries. Project Honey Pot is a service provided by Park City, Utah-based antispam company Unspam Technologies Inc.
"If you've harvested e-mail addresses or sent spam in the last two years, chances are you're on our radar screen, and we're coming after you," a note posted on the Project Honey Pot Web site said today.
"This lawsuit is unique because we believe it is the first major case in the United States to bring a claim against spammers for harvesting e-mail addresses," the note said. "While this practice has been a penalty enhancement under the CAN-SPAM Act since it was passed, in most cases the data was not available in order to prove an address was harvested."
Project Honey Pot bills itself as a system for identifying spammers and the so-called spambots used by e-mail harvesters to scrape addresses from Web sites. Web site owners can install honey pot software on their sites that allows them to identify spam, as well as when the e-mail was sent to was harvested by the spammer -- and the IP address of the harvester.
The defendants in the case are the "John Does" responsible for e-mail harvesting and spamming, Praed said. "Spammers are very good at hiding themselves," he said. "But what they can't hide are the data points that they use [for spamming]. We have got a lot of those data points."
Among the terabytes of data Project Honey Point has collected are more than 6 million unsolicited e-mails, 2.5 million IP addresses from which spam was sent and about 15,000 IP addresses belonging to e-mail harvesters.
The data will allow the plaintiffs to ask the court to subpoena Internet service providers for the identities of the owners of some of these IP addresses, Praed said. "We are going after the largest targets. The discovery will focus on the big fish," he said. "Some of these guys have made a big mistake. They have failed to use anonymity. If you are going to commit an Internet crime, everything has to be anonymous."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts