Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Rise of the Spam Zombies
SecurityFocus ^ | Apr 25 2003 4:45PM | Kevin Poulsen

Posted on 04/29/2003 1:28:28 PM PDT by LynnHam

Pressed by increasingly effective anti-spam efforts, senders of unsolicited commercial e-mail are resorting to outright criminality in their efforts to conceal the source of their ill-sent missives, using Trojan horses to turn the computers of innocent netizens into secret spam zombies.

"This is the newest delivery mechanism," says Margie Arbon, director of operations of anti-spam group MAPS. "I've been looking for it for a year, and in the last couple of months people have actually found Trojans that are doing it... They're carrying their own SMTP engines. Failing that, they install open proxy software."

One of those programs popped up last week. Named "Proxy-Guzu," when executed by an unwitting user the Trojan listens on a randomly-chosen port and uses its own built-in mail client to dash off a message to a Hotmail account, putting the port number and victim's IP address in the subject line. The spammer takes it from there, routing as much e-mail as he or she likes through the captured computer, knowing that any efforts to trace the source of the spam will end at the victim's Internet address.

Trojan horses generally rely on their wielder's ability to trick innocent people into executing them. Proxy-Guzu, naturally, arrives as spam -- in one sighting the program was offered as a naughty peek at an online webcam.

One early victim of the malware, posting to an anti-virus message board, says he detected it only when his desktop firewall program alerted him to large quantities of outgoing e-mail messages sent to unfamiliar addresses, with subject lines like "Don't tell your parents about this!" and "your bill."

'Untraceable' Spammers are borrowing the trick from the method electronic vandals use to create computer armies capable of launching distributed denial of service (DDoS) attacks against webservers. What may have been the first Trojan horse custom-tailored for spammers emerged last November: called "Jeem," it grants the perpetrator full access to a victim computer, but also includes a built-in SMTP server to facilitate e-mail laundering.

Arbon says the spam worlds' plunge into adolescent hacking techniques is a result of spammers enjoying fewer and fewer online havens from which to operate. "With the filters and the lists and heurists and all the mechanisms out there people are using, I think the people that are trying to find a way to get the mail delivered are resorting to alternative tactics," she says. "It's untraceable. I hate to put that in print, but it's the truth."

Of course, it also puts the spammers squarely on the wrong side of the law. "As a general rule it's legal to send someone an e-mail even if they don't want it," says Mark Rasch, a former Justice Department computer crime attorney. "But once you break into their computer and get their computer to send e-mail to someone else, then you're violating federal and state computer crime laws."


TOPICS: Crime/Corruption; Front Page News; Technical
KEYWORDS: crime; spam; trojanhorses; virus
Navigation: use the links below to view more comments.
first 1-2021-28 next last
This got passed out at work ... Thought I should post it since it is really a bad one!
1 posted on 04/29/2003 1:28:28 PM PDT by LynnHam
[ Post Reply | Private Reply | View Replies]

To: LynnHam
Rule of thumb - give your home e-mail address to NO ONE.
2 posted on 04/29/2003 2:20:34 PM PDT by FierceDraka ("I am not a number - I am a FREE MAN!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: FierceDraka
Rule of thumb - give your home e-mail address to NO ONE.

Another rule: Never open an attachment, unless it's from a trusted source.

"I am not a number - I am a FREE MAN!"

Be seeing you. ;-)

3 posted on 04/29/2003 2:57:41 PM PDT by DaveCooper
[ Post Reply | Private Reply | To 2 | View Replies]

To: LynnHam
Tar and Feather them...
4 posted on 04/29/2003 2:58:56 PM PDT by observer5
[ Post Reply | Private Reply | To 1 | View Replies]

To: LynnHam
One thing I don't understand: how do spammers make money targetting spams to people who take great pains not to receive them?

I can undrstand in a few cases, like "Buy our new improved spam-blocking software and you won't have to put up with this junk anymore", efforts to reach those who would otherwise be hard-to-spam could possibly net customers, but otherwise?

It seems to me there's something driving spam besides the profit motive, since the 'market' is so thoroughly glutted and I don't think there's much money there other than in sales of spam-related (pro- or anti-) services.

What's really going on?

5 posted on 04/29/2003 3:34:45 PM PDT by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #6 Removed by Moderator

To: LynnHam
The solution to SPAM is to start class action lawsuits against the beneficiaries or the spam advertising. The spammers themselves may not be locatable, but someone is PAYING them to advertise their websites and products. Since the idea is to attract sales of known products and services or website hits on known locations, those who benefit from spam should be liable for the havoc their AGENTS create.

My time is worth $50 per hour. I find that I am devoting at least 1 hour per week to screening and deleting spam because no spam filter is 100% effective. This means that spam costs me $2,600 per year of my time. I should be able to add additional costs for wear and tear on my computer, some portion of my internet bill for downloading useless garbage, and punitive damages. I think that $5,000 per user would be a good figure.

Are there any creative Class Action Tort lawyers out there interested in making tons of money?
7 posted on 04/29/2003 5:29:26 PM PDT by Swordmaker (Tagline Extermination Services, franchises available, small investment, big profit)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LynnHam
Its also known as spyware. It is often contained in music pirating software such as Morpheous and Kazaa and others. I was getting barraged by pop ups on my machine. Some of them had a logo for "Gator" software. Upon checking out my machine I found two directories one called CMEII and the other called GME. They were located in the \program files\common files directories. I ran the taskmanager (hit ctl alt del) and found two programs working on my computer, GME.exe and CMEII. I disabled both programs and deleted the directories. I was unable to delete them until I cancelled the programs. Beware, spyware could be running on your computer.
8 posted on 04/29/2003 5:40:31 PM PDT by appeal2
[ Post Reply | Private Reply | To 1 | View Replies]

To: FierceDraka
Rule of thumb - give your home e-mail address to NO ONE.

Hm, this would work.

...but then that means you'd never use it. ;-)

9 posted on 04/29/2003 5:44:30 PM PDT by k2blader (Reason is our soul's left hand, Faith her right. - John Donne)
[ Post Reply | Private Reply | To 2 | View Replies]

To: k2blader
A friend of mine sent me an email titled "From Suzy and Jacky". I knew her as Suzanne and her hubby as Jacques, not as "Suzy and Jacky", and I deleted the email, thinking it was porno. We got a good laugh out of it.

I delete at least one shady message a day. I don't know why I get them, I never visited a porn site.

10 posted on 04/29/2003 6:55:32 PM PDT by Ciexyz
[ Post Reply | Private Reply | To 9 | View Replies]

To: LynnHam; Mitchell
Can someone explain this to me.
I have an e-mail account under a pseudonym
(hotmail)
which I use only to communicate with two people
(both family members).
I never have sent e-mail to anyone else from it.
Yet I get far more spam on it
than on any other account,
up to 100 a day.
I have other hotmail accounts
which I use much more frequently
yet they receive less spam.
Can anyone explain?
11 posted on 04/29/2003 7:01:00 PM PDT by Allan
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ciexyz
I delete at least one shady message a day. I don't know why I get them, I never visited a porn site.

I empathize.

Not sure how the creeps got my address but recently I've been receiving around 10 spams a week. Just a couple months ago I had been receiving virtually none.

My suspicion is some virus/worm/trojan got into one of my friends' email address books...

12 posted on 04/29/2003 7:13:59 PM PDT by k2blader (Reason is our soul's left hand, Faith her right. - John Donne)
[ Post Reply | Private Reply | To 10 | View Replies]

To: appeal2
Tried a new freeware named Spybot. Used with Ad-Aware your drive should be pretty sterilized. Zone Alarm is indespensable. PCcillin lifetime support came with an Asus motherboard (best deal ever in retrospect).
No such thing as too paranoid.
13 posted on 04/29/2003 8:11:30 PM PDT by NewRomeTacitus (They get me when I remove the foil for showers.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Allan
They send to ("every legal combination of email adderss characters")@hotmail.com
14 posted on 04/29/2003 8:15:57 PM PDT by Poohbah (Crush your enemies, see them driven before you, and hear the lamentations of their women!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Poohbah
Mathematically impossible.
15 posted on 04/29/2003 8:48:16 PM PDT by Allan
[ Post Reply | Private Reply | To 14 | View Replies]

To: LynnHam
I'm wondering why they go to the trouble. Does anybody really respond to spam? Not anyone I know.

How much of response is necessary to make this sort of thing profitiable? Are they looking for the one big sucker? With the Nigerian banking scam I could believe this, but how does this work for

Could it be that the spammers are incompetant as well as annoying? Or suckers themselves (become a spammer and make BIG BUCKS)?
16 posted on 04/29/2003 9:13:01 PM PDT by Salman
[ Post Reply | Private Reply | To 1 | View Replies]

To: Allan
This has been widely remarked on. Spammers sometimes send out mail addressed to (every name on a giant list)@somewhere.com. The giant list presumably consists of usernames that have been found to be valid at other ISP's.

Some people have also speculated that one or more individuals with administrative access at hotmail have sold address lists. Or that hackers have broken into hotmail and obtained address lists in that fashion.

17 posted on 04/29/2003 9:43:25 PM PDT by Mitchell
[ Post Reply | Private Reply | To 11 | View Replies]

To: Allan
How so?

It's a finite set of characters.

Hell, I have an alphanumeric hotmail address that is not tied to my name, address, or anything else--and it gets spammed regularly.
18 posted on 04/30/2003 4:59:08 AM PDT by Poohbah (Crush your enemies, see them driven before you, and hear the lamentations of their women!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Poohbah
"How so?

It's a finite set of characters. "

Let's imagine a very short address: 9 characters.
Assume 30 ASCII characters.
Assume one-millionth of a second required
to send one e-mail to one possible address.

The operation would require 227 days.

Raise that to 12 characters the operation would require 2 billion years.

19 posted on 04/30/2003 12:35:07 PM PDT by Allan
[ Post Reply | Private Reply | To 18 | View Replies]

To: NewRomeTacitus
"Tried a new freeware named Spybot."

Spybot also rid my computer of freescratchandwin, gator, etc.
20 posted on 04/30/2003 12:49:55 PM PDT by maggief
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-28 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson