| 2:11 pm on Oct 15, 2008 (gmt 0)|
Good, let's get China, Russia, and Brazil on board as well and we can cut down the overwhelming bulk of spam!
| 2:42 pm on Oct 15, 2008 (gmt 0)|
Maybe thats why I seemed to have less emails this morning in my inbox. lol
| 3:06 pm on Oct 15, 2008 (gmt 0)|
Are they actually selling the product themselves or is someone hiring them to send out the spam for the 3rd party's product? Because you need to go after the people paying them or other spammers will just rise up in their place.
| 3:27 pm on Oct 15, 2008 (gmt 0)|
Hopefully these were the guys hammering my email server. Each month this year I've had a couple of days where my server is slammed by 1200 messages per minute. Totally chokes my NOC because it's not setup for that kind of load. They used one of the company email addresses as a "from" address so tons of bounced / failed messages were being returned to my server instead of theirs. The spam was all about watches. I think I'll try to contact someone involved in the case.
| 4:20 pm on Oct 15, 2008 (gmt 0)|
Very good news. I hate spammers! Bill Gates said there was going to be no spam by now, what went wrong!
| 4:32 pm on Oct 15, 2008 (gmt 0)|
Guantanamo Bay would be too good for these people.
| 5:12 pm on Oct 15, 2008 (gmt 0)|
Excellent find engine!
|"It wouldn't be a surprise if people don’t notice any difference in their in-box tomorrow morning." |
I think that sums it up. That was the very last line of the post. ;)
| 8:50 pm on Oct 15, 2008 (gmt 0)|
|the group’s Mega-D botnet — named after one of its pill products — was made up of 35,000 computers and could send 10 billion e-mail messages a day. |
No mention of whether they actually disabled the 35K machines in the botnet.
So they stopped one spammer yet the botnet is just waiting for another bot herder to come along and take control of the botnet, which happens all the time.
Temporary reprieve is all we got.
| 12:38 pm on Oct 16, 2008 (gmt 0)|
that is awesome, That actually excites me... I deal with about 20+ email accounts and all 20 have their own set of spam ranging from 1000+ when i get here in the morning. and today and yesterday was only a handful. I had more time.. i don't know what to do with all the extra time... eh, oh well...
| 3:30 pm on Oct 16, 2008 (gmt 0)|
Last time I saw a "botnet shut down" news item my spam went down for about 3 days.
The answer is to jail the advertisers as well as the spammers.
| 9:57 am on Oct 17, 2008 (gmt 0)|
No significant change in the list of quarentined spam in my email this morning.
| 8:40 am on Oct 26, 2008 (gmt 0)|
Most of the spam we would get nailed with never sees our inboxes. Turn them around at the server mates, send the spam they sent to you right back at them, or their DC's, if you can.
If more people would send spam back to where it came from, instead of throwing it down a black hole, the DC's and web hosts of this world would do a better job of ridding the net of it.
| 9:54 am on Oct 26, 2008 (gmt 0)|
How to you identify where it [really] came from?
The "From" address is usually fake. That's why the guy above was receiving 1200 bounces per day for mail that he didn't actually send.
I never bounce this stuff. It goes into a black hole.
| 4:59 pm on Oct 26, 2008 (gmt 0)|
Sure, that is if you choose to use the info placed into forged headers to do your bounce.
Email addresses don't mean a thing, so bouncing by way of them would only serve to defeat the purpose.
Mail servers can be configured to log the originating ip, and the hops it took, from one machine to the next, in order to get to you, so this is what you use.
Of course, upon after configuring your mail server to log originating ip's, you would then do well to learn how to read the mail headers themselves, in order to more effectively return the mail from whence it came.
Though you may not, at times, provide the bounce directly to the spammer, no worries ... most bounces go to the host of the client spammer automagically, thus, putting the host on the spot for change.
Here we would have the spammer's host, getting the spam that was originally intended for you, after which, the client spammer would get a boot to the head from their host.