Feeds

Dutch blogsites fight cyberwar against spammer

Shock and awe

  • alert
  • submit to reddit

Build a business case: developing custom apps

Dutch blogsites Retecool.com, Volkomenkut.com and Bastard-inc.com got a taste of their own medicine last Friday after they declared cyberwar on US spam firm Customerblast.com.

The weblogs, known for their satirical pranks, had written a script of war to push Customerblast off the web with sustained distributed denial of service (DDOS) attacks. This was in response to a mail bomb sent by the spam firm to Retecool. For those unfamiliar with Retecool that has the same effect as pinching the behind of a club bouncer.

The scripts of war worked well. The spammer’s site sunk like a stone. But Customerblast (the name suggests that we’re in Schwarzenegger territory here) fought back. On Friday, all three weblogs were inundated with mail bombs, floods and DDOS attacks, forcing them to go offline temporarily. Even Retecool's hosting provider Tune-In Internet had to bear the storm, which lasted for six hours.

Late Friday afternoon, the weblogs began a second attack. 'Don't mess with the Dutch', was the message they wanted to communicate. On Monday (November 24th), the spammer had still not recuperated from the attacks.

Customerblast is a company run by Steve Sorenson, aka John Hites, aka Sarah Johnson, aka Laurence King, aka Sorenson And Ass, aka Advertising International, aka Internet Ads aka Sales Pro ltd. The company offers spam services and bulletproof hosting for almost nothing (don't they all?). AT&T, HopOne, ThePlanet.com, CUBEXS, Cable & Wireless and Genuity/Verizon are among the companies that booted the spammer after thousands of complaints.

Apparently, not all ISPs in the Netherlands could appreciate the attack against Customerblast. One cyberwar participant, named Bumble, says he was cut off by his provider and now faces ‘legal action’.

It shows that getting back at spammers may not always be a good idea. Just last week a Silicon Valley programmer was arrested for threatening to torture and kill employees of a company he blames for bombarding him with advertisements promising to enlarge his penis.

He should have waited: The US House of Representatives last Friday voted to outlaw most spam, while a much tougher Californian law goes into effect on January 1. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?