[SA-exim] teergrubing

jvanasco at mastersofbranding.com jvanasco at mastersofbranding.com
Thu Aug 21 16:47:40 PDT 2003


The idea isn't to DOS -- the idea, is to have a clickthrough for every=20=

recipient.

Mr.Spammer sends out 5,000,000 emails.  5,000,000 x 1k isn't much=20
bandwidth.  He only needs 5 people to buy his wares to turn a profit on=20=

the mailing =96 and he doesn't expect more than 200 people or so to =
click=20
through to his website.

His website though, if you visit and click around, is over 200k with=20
images and html.   Every 2,500 visits to that site will cost him as=20
much as emailing 5,000,000.

10,000 people using a plugin in their email app that downloads the=20
contents of a spammers website drives his costs up 500%.

Its not a DOS attack.  Its not illegal.  It is a simple response to an=20=

advertising callout.  "Buy my stuff: click here for info".  A plugin=20
automatically clicks the links for you and saves them to disk.

If 100,000 people used the plugin then, possibly, it could have the=20
same effect as a DDOS -- but technically, and legally, it wouldn't be,



On Thursday, August 21, 2003, at 03:21 PM, Tony Earnshaw wrote:

> jvanasco at mastersofbranding.com wrote:
>
>>>> anyone have info on the machines that spammers host their=20
>>>> shoppingcarts on though?
>>>
>>> Let me guess :o) You want to become a spammer and want to set up a=20=

>>> shopping cart site. You want info from us all over the hardware on=20=

>>> which to set that up.
>> Totally.  I want to spam you, your mom, and your mother's religion.
>
> I use SpamAssassin. My mother's been dead for many years.
>
>> If spammers are mailing their shit from hacked machines, it makes me=20=

>> think that *possibly* they are hosting their shopping cart sites on=20=

>> hacked machines too.
>
> Point is, that those machines are not hacked. Or very few of them.=20
> They don't have to be. Those machines have been configured by people=20=

> (sysadmins, ordinary people who bought a machine at the computer=20
> store, you name it) who have no idea. There are millions of such=20
> machines on the Internet. They are badly configured MTAs, http proxies=20=

> (Windows of all kinds, Apache), socks5 proxies and even other server=20=

> types.
>
>> If that is a high probability, I don't want to up the bandwidth of=20
>> people too dumb to configure a server securely.  If most spammers=20
>> sell their wares off of their own websites though -- I have no=20
>> problems with the idea of upping their bandwidth bills.
>
> They're fly-by-nights, most of them at any rate. Today they are one=20
> place, tomorrow another. If a new on comes in their place, who cares?=20=

> You do an (illegal) DoS attack on one site one day, tomorrow it's=20
> someone else's property and legal. And how would you mount a DoS=20
> attack anyway, technically?
>
>> Their business model depends on low overhead.  They count on nearly=20=

>> every person they spam trashing the message.  But what if every=20
>> person they spammed visited their website?  Multiple times? =20
>> Bandwidth is cheap
>
> You have to be be joking. Though it's possible -=20
> www.ilovetheirakiminiinformationminister.com was forced to its knees=20=

> for a few days, through everybody visiting it. Not any more though.=20
> Ganging up on some temporary Viagra or penis growth site isn't going=20=

> to work. Unless you invent some new trojan to bomb them with. Odds are=20=

> I'll be reading about you in SANS or somewhere, if you try, though.
>
> Tony
>
> --=20
> Tony Earnshaw
>
> Looking backwards is always easy with hindsight
>
> http://www.billy.demon.nl
> Mail: tonni at billy.demon.nl
>




More information about the SA-Exim mailing list