Honeypots mailing list archives
RE: spam honeypot
From: "Steve" <djsteveb () comcast net>
Date: Fri, 23 Dec 2005 03:01:46 -0600
Might want to check with the FTC and the Canadian gov't... They are calling them proxy pots.. " two of the "victim" computers in the FTC cases were actually decoys, known as "proxy pots." " From: http://today.reuters.com/news/newsarticle.aspx?type=domesticNews&storyid=200 5-12-20T192317Z_01_EIC069553_RTRUKOC_0_US-SPAM-FTC.xml If this has been covered in the list, I apologize, I checked the last so many and did not see mention of it... I suppose this will be the case that decides about the whole honeypot entrapment thing maybe... WASHINGTON (Reuters) - U.S. and Canadian authorities took legal action against e-mail spammers who were using hijacked computers to conceal their identities, the Federal Trade Commission said on Tuesday. The FTC said eight spam operators had been shut down or sued in a series of actions taken by the FTC, Canadian consumer protection officials and state attorneys general in Florida, North Carolina and Texas. Among the products being hawked in the e-mails were prescription drugs, mortgages and purported "fuel-saving" devices for automobiles, the FTC said. In the three cases brought by the FTC, the agency said it had charged spammers with violating federal law by sending spam with false information about the source of the message and misleading subject lines, and by failing to provide an "opt-out" option or a physical address. The FTC said the spammers targeted in the all cases had hijacked the computers of innocent consumers and used them as "spamming machines" to relay the illegal e-mails. That practice obscures the original source of the message so spammers can avoid detection by law enforcers and allows them to thwart filters used by Internet service providers, the agency said. However, two of the "victim" computers in the FTC cases were actually decoys, known as "proxy pots." Instead of relaying the spam, they captured it and passed crucial information to law enforcement officials. Two other cases were settled by Canada's competition bureau, with the defendants agreeing to refrain from future violations and pay a penalty. The three state attorneys general filed complaints seeking to block three more spam operations, the FTC said. Those cases are still pending. -----Original Message----- From: Jason Beauford [mailto:jmbeauford () hotmail com] Sent: Thursday, December 22, 2005 1:49 PM To: george.p123 () gmail com; honeypots () securityfocus com Subject: RE: spam honeypot Check out the Mailinator Project. They've got a FANTASTIC system for catching spam...Best I've seen. http://www.mailinator.com JMB
From: George <george.p123 () gmail com> To: honeypots () securityfocus com Subject: spam honeypot Date: Wed, 21 Dec 2005 16:02:24 +0200 Hello! I'm making a research about spam and i need a system to catch the spam with my sources in real time. I read a lot of documentation about honeypots and i want to develop an open relay honeypot. The problem is that all the documentation that i had read is old and the things had change, the spammers evolved. So, i want to ask how efficient is an open relay honeypot and what other honeypot technology i can use to catch spam? Thanks in advice! George
Current thread:
- spam honeypot George (Dec 22)
- RE: spam honeypot Jason Beauford (Dec 22)
- RE: spam honeypot Steve (Dec 23)
- Re: spam honeypot Matthew Guertin (Dec 26)
- RE: spam honeypot Jason Beauford (Dec 22)