Language Selection

English French German Italian Portuguese Spanish

On-the-run spammer caught and canned

Filed under
Security

One of the world's most prolific spammers has been arrested in the US as he stepped off a plane from the Dominican Republic, where he had been holed up running his illegal operation.

Christopher Smith, originally from Minnesota, has moved his operation around the world to locations such as China and Malaysia, according to anti-spam campaign group Spamhaus. Earlier this year US authorities seized assets from Smith and shut down one of his businesses which was illegally selling pharmaceuticals online.

According to Steve Linford from Spamhaus, who traces the movements of the world's worst spammers, Smith then went on the run with a fake passport.

During this time Spamhaus was in contact with the FBI, sharing information on Smith's movements and activities. Spamhaus was notified by the FBI about Smith's plans to return to the US and Smith was arrested late last week as he stepped off the plane in Minneapolis.

According to Linford, Smith was a particularly prolific spammer.

"He was well up in our top 10," Linford said. But it was his decision to the return to the US which was his undoing.

"It seems that he must have forgotten something and came back but really I think he was just incredibly stupid," said Linford.

Last week's arrest was related to Smith skipping bail and travelling with forged documents, following his initial arrest for illegally selling pharmaceuticals. But Linford isn't too worried that the arrest did not take into account Smith's spamming, as long as he is now out of the picture.

"Behind bars is behind bars," Linford said.

Unsurprisingly, given the close tabs the organisation kept on him, Smith also had a particular axe to grind with Spamhaus.

"At one point he even tried to register the domain Spamhaus.org.uk and offer spam services from it in an attempt to damage our reputation," Linford said.

Source.

More in Tux Machines

Security News

  • Security updates for Friday
  • [Older] Microsoft Delays February Patch Tuesday Updates Until Next Month
    It was created by Microsoft as a way to have a standard delivery date/schedule for updates that were being provided for the companies software. This allowed a lot of stability for users and IT Pros so they could be prepared for the monthly distribution oof the updates. Well this month Microsoft has hit a snag with their monthly Patch Tuesday.
  • Watershed SHA1 collision just broke the WebKit repository, others may follow
    The bug resides in Apache SVN, an open source version control system that WebKit and other large software development organizations use to keep track of code submitted by individual members. Often abbreviated as SVN, Subversion uses SHA1 to track and merge duplicate files. Somehow, SVN systems can experience a severe glitch when they encounter the two PDF files published Thursday, proving that real-world collisions on SHA1 are now practical.
  • Cloudflare Reverse Proxies are Dumping Uninitialized Memory
    Thanks to Josh Triplett for sending us this Google Project Zero report about a dump of unitialized memory caused by Cloudflare's reverse proxies. "A while later, we figured out how to reproduce the problem. It looked like that if an html page hosted behind cloudflare had a specific combination of unbalanced tags, the proxy would intersperse pages of uninitialized memory into the output (kinda like heartbleed, but cloudflare specific and worse for reasons I'll explain later). My working theory was that this was related to their "ScrapeShield" feature which parses and obfuscates html - but because reverse proxies are shared between customers, it would affect *all* Cloudflare customers. We fetched a few live samples, and we observed encryption keys, cookies, passwords, chunks of POST data and even HTTPS requests for other major cloudflare-hosted sites from other users. Once we understood what we were seeing and the implications, we immediately stopped and contacted cloudflare security. "
  • Secure your system with SELinux
    SELinux is well known as the most sophisticated Linux Mandatory Access Control (MAC) System. If you install any Fedora or Redhat operating System it is enabled by default and running in enforcing mode. So far so good.

Android Leftovers

Entroware Launches Ubuntu-Powered Aether Laptop with Intel Kaby Lake CPUs

Softpedia was informed today, February 24, 2017, by Entroware, a UK-based hardware manufacturer known for building and selling desktops, laptops, and servers with the popular Ubuntu Linux operating system pre-installed, about a brand-new product. Read more

3 little things in Linux 4.10 that will make a big difference

Linux never sleeps. Linus Torvalds is already hard at work pulling together changes for the next version of the kernel (4.11). But with Linux 4.10 now out, three groups of changes are worth paying close attention to because they improve performance and enable feature sets that weren’t possible before on Linux. Here’s a rundown of those changes to 4.10 and what they likely will mean for you, your cloud providers, and your Linux applications. Read more