Feeds

NY teen charged over IM spam attack

UR nked

  • alert
  • submit to reddit

Remote control for virtualized desktops

A New York teenager has become the first American to be arrested for sending spam messages across IM networks. Anthony Greco, 18, of Cheektowaga, New York, was charged with violations of the CAN-SPAM Act after allegedly sending 1.5m messages punting mortgage refinancing and adult pornography to MySpace.com users in October and November 2004. According to a criminal complaint, Greco created thousands of fraudulent instant messaging accounts on MySpace.com to bombard its users with junk IM messages.

Greco allegedly threatened additional attacks unless MySpace.com, an online community site popular with teenagers, hired him as a consultant. He travelled to Los Angeles last week hoping to granted "exclusive" rights to send commercial e-mail to users of the MySpace.com only to be arrested by officers from the US Secret Service and the Los Angeles Police Department after he stepped off the plane.

Along with violating the CAN-SPAM Act, Greco is accused of causing damage to MySpace.com's computers "with the intent to extort", and causing damage to a protected computer, offences punishable by a combined maximum of 18 years imprisonment on conviction. Greco was released 17 February on a $25,000 bond, the LA Times reports. ®

Related stories

Look out spam, here comes spim
Is spim worse than spam?
US giants move to can spammers
Spam gets vocal with VoIP

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.