rooster Posted October 4, 2009 Share Posted October 4, 2009 FROM: "Announcing the Spamhaus CSS 2009-10-02 05:22 GMT" by Tom Mortimer http://www.spamhaus.org/news.lasso?article=646 While filtering methods for botnet spam are now quite effective, a new breed of static-IP address spammers has evolved, and their spam evades many filters. It is time to target the next great spam problem, "snowshoe" spam. Like many of you, we at The Spamhaus Project have seen a burgeoning flood of spam emails, not from compromised IP addresses or botnet ranges, but from static IP address ranges. The IP addresses that send this spam properly identify their host names when connecting to a mailserver. At first glance, the emails that they send look like legitimate bulk emails, except that they were sent to spamtraps or to our own email addresses, which we know did not ask for that email. Most of them send modest volumes of email that do not trigger automated spam blocking filters or reputation metrics. It is this technique, spreading the load out over a larger area, that gives snowshoe spam its name. <snip> I've been keeping a close watch on my 3 remaining spamtrap addies since my ISP subscribed to the Ironport filter(s) last January. I'm confident that the 'cited' Snowshoe shadenfreud have had no (as in zero) impact that I can detect. Link to comment Share on other sites More sharing options...
This topic is now archived and is closed to further replies.