Feeds

Twitter slams top five spammers with legal suit

Big bird gets busy

Secure remote control for conventional and virtual desktops

Twitter has filed a legal suit against five entities for selling tools that send out spam tweets and clog up its network.

The suit names TweetAttacks, TweetAdder, and TweetBuddy, plus James Lucero of Justinlover.info and Garland Harris of Troption.com as its targets. In the legal filing, Twitter says that it has had to pour resources into its Trust and Safety team to try to stop spam, and has spent nearly a million dollars to counter the effects of the five defendants.

"With this suit, we're going straight to the source. By shutting down tool providers, we will prevent other spammers from having these services at their disposal. Further, we hope the suit acts as a deterrent to other spammers, demonstrating the strength of our commitment to keep them off Twitter," the company said on its blog.

The filing points out that all of the accused have signed up for a Twitter account, which involves signing the terms of service that specifically prohibit spam generation, as well as selling software that also breaks Twitter's terms. Furthermore, they market their code specifically as being able to circumvent existing spam controls.

As for the goal of the suit, Twitter wants the defendants to be shut down and claims damages equal to the amount it estimates they have cost the company. That works out at $300,000 for TweetBuddy , $150,000 for TweetAttacks, a $100,000 bill for James Lucero, and for TweetAdder and Garland Harris, $75,000 apiece.

Twitter made clear that it wasn't just relying on the legal system in its anti-spam campaign, but is beefing up security-engineering efforts as well. Just how successful it is will depend upon the ability of spammers to react technologically, and whether or not they are worried about their legal position. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?