Structure & Strangeness

 

: Spam Warrior :

: Here's what turned up in my queries. I've highlighted the important
: bits again.


samSpade_results.gif

: You'll want to look through the Whois and the IP Block information to see
: what ISP the spammer is using (assuming the IP address wasn't spoofed).
: Here, the top highlight tells me that I'm looking at a spammer in Chile because
: that's where the service provider is located that initially forwarded the email.
: The bottom highlight shows us the exact IP address of that forwarding machine.
: The double reference for the IP Block look-up means that two parties are listed
: as 'owning' that range of IP addresses. We're going after the second one
: because the machine just upstream from our target is from that domain name.
: Another point worth mentioning is that if the Traceroute returns a "* *" for any
: hops across the network, that means that the machine at that hop is not
: responding to Traceroute. That's either because it's mis-configured (unlikely),
: set to ignore Traceroutes (possibly), or isn't connected to the network (i.e. a
: modem connection). The latter can be frustrating, but do a look-up on the
: last solid IP address logged - a lot of times, that will be their ISP.

: Since we didn't get any contact information with this sweep, we'll have to dig
: a little deeper; what I'm looking for is an email address to send a message
: to regarding system abuse.

: Another point worth making is that in some states (Washington, particularly)
: it's possible to get money out of this sort of venture. That's right! You can
: get up a $1,000 a pop, and many spammers will settle out of court for a
: little less than that. There was a fine article written for the NYTimes that
: covers that, and also helped me get started with this business (see the
: references on page 3).

: Mr. Spammer, in Chile, with the spam/virus :

: Let's find out a little more about Entel Chile S.A. SamSpade will automatically
: enter the appropriate information into a new search page if you click one of
: the links from the search results page. This time, we want the specific contact
: info, so we'll use the GeekTools' Whois server as such :


samSpade_whois.gif

: Here's what it turns up - definitely some good stuff, although it lacks some
: of the conveniences of western telecom's whois entries i.e. "abuse@telecom.com"
: addresses. It does turn up the address of a technical contact and their
: web address. Those are the best way forward if you want to get a response,
: in my opinion. Don't get your hopes up that you'll see immediate results
: after contacting them - ISPs get snowed with complaints, so the best you
: can do is to pass along a detailed message and attach the offending bit
: of mail you're miffed about.


samSpade_geektools.gif

: Now that we know a little bit about who's system is being hijacked to
: proliferate the Hybris worm, we can contact them directly and notify
: as such. Hopefully, they'll get around to fixing the problem. If you
: keep getting spammed, and the ISP is unresponsive, keep bugging
: them about it! Just forward every piece of spam from their system to
: their contact person and eventually, you'll get some action. Meanwhile,
: keep a log of all email you send them - if need-be, you can get legal
: or political on their ass (which requires a paper-trail).

: Making contact with the Telecos.

 

: Creative :
.: Photography :.
.: Artistic :.
.: Blog :.
.: Thinking :.
.: Research :.

: Persona :
.: About :.
.: .plan :.
.: Vitae :.

: Website :
.: Search :.
.: Copyright :.
.: Sitemap :.
.: Links :.

© Aaron Clauset

updated 7.16.01