Feeds

Russian spammer murder hoax exposed

Thick Skin yarn punctured

The Power of One eBook: Top reasons to choose HP BladeSystem

A yarn that a prolific Russian spammer was whacked by Russian hit-men is increasingly looking like a hoax.

The supposed assassination of one "Alexey Tolstokozhev" in Moscow, was first reported on a website run by "Alex Loonov".

Loonov's account (at loonov.com/russian-viagra-and-penis-enlargement-spammer-murdered.htm) seemed all too plausible to the casual observer, especially since it played into public perceptions about the Russian mafia.

Alexey Tolstokozhev (btw, in Russian his name means 'Thick Skin'), a Russian spammer, found murdered in his luxury house near Moscow. He has been shot several times with one bullet stuck in his head. According to authorities, this last head shot is a clear mark of russian hit men (known as "killers" in Russia).

The story was picked up by blogs and spread rapidly across the net.

Unfortunately, the tale is a load of cobblers.

First up, the name Alexey Tolstokozhev doesn't appear on Spamhaus' ROKSO list, an odd omission for a supposedly prolific spammer. Perhaps he's managed to dodge ISP takedown orders, if not assassins bullets.

Or perhaps not.

Alexey Tolstokozhev fails to show up on any web searches either, except in the context of his supposed assassination. Informed parties, such as Sunbelt president and chief executive Alex Eckelberry, have never heard of him either.

Eckelberry did a little digging and discovered that Loonov's website, where reports of the hit first surfaced, was only registered on Tuesday and with EST Domains, an operation that has attracted complaints about hosting malware.

Loonov's website is free of malware (at least at the time of writing) but distinctly whiffy. Bloggers who first took the story at face value have begun to reverse their positions. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.