Blue Frog “Do Not Spam” Email List Stolen and Spammed

The Internet Patrol default featured image
Share the knowledge

It was inevitable. Blue Frog, the “anti-spam” company which tries to get spammers to stop spamming by spamming the webforms of spammers who spam Blue Frog’s customers, had their “do not spam” email list stolen by spammers, and now that list of Blue Frog customers is getting spammed.

[Website maintenance provided by Usestrict and we love them!]

To be more clear, when you sign up for Blue Frog’s service, and give them your email address, any time someone spams you, they spam that someone back – actually it’s more of a DOS – they bombard any webforms that the spammer has with tons of data, in an effort to cripple the server. The way that the spammer can stop the DOS is by not spamming that email address that is on the list of Blue Frog’s customers – their “do not spam” list.

Today Richi Jennings, an industry watcher in the UK, is reporting that Blue Frog’s “do not spam” list has fallen into the hands of spammers, and is being spammed with all sorts of dire warnings. Jennings has himself seen the list, so he knows of where he speaks.

Says Jennings, “I’ve seen the list. It’s not complete in the sense that it doesn’t include the wildcard domain entries. It also doesn’t include spamtraps that I know to be there. Presumably a spammer has taken his list and “cleaned” it against the blue list, then done a diff? Like I say, I’m amazed it’s taken so long.”

So are we.

The Internet Patrol is completely free, and we don't subject you to ads or annoying video pop-ups. But it does cost us out of our pocket to keep the site going (going on 20 years now!) So your tips via CashApp, Venmo, or Paypal are VERY appreciated! Receipts will come from ISIPP.

CashApp us Square Cash app link

Venmo us Venmo link

Paypal us Paypal link

So if you are a Blue Frog customer, and have started getting some unusual or pointed spam, now you know why.

[Ed. note: Since this was first posted, reports have become confused and unclear as to whether the Blue Frog list was actually stolen. But this much is clear – if it was not stolen, it was reverse-engineered by spammers (in other words they took their spam lists, matched them against Blue Frog’s – which is what Blue Frog demands they do – and then noted which addresses were on the Blue Frog list, and built their own second list of Blue Frog users).]

[Ed. note 2: based on several responses in the comments below, it’s pretty clear that people who sign up for Blue Frog really don’t get what they are signing on to. Did you not read the following before you gave them your email address, and let them start using your computer as part of a distributed attack against machines which may not even know they are harbouring spammers (much like you may not know you are using your computer to attack what may be innocent machines?)

This is from Blue Frog’s own website (read it all):

“Opt-out requests are posted by the Blue Frog client application used by consumers that added their personal e-mail addresses to the Registry through Blue Security’s free consumer offering.

Requests are not posted by Businesses and organizations that added their e-mail domains to the Do Not Intrude Registry through Blue Security’s paid business offering.

For each site advertised by spam, Blue Security develops a script for the Blue Frog client, instructing it how to submit an opt-out request on that site.

Each user’s Blue Frog client retrieves the scripts from Blue Security servers and posts the opt-out requests. A single opt-out request is posted per each spam message received by that user.

Complaints are posted in a manner similar to the way a user would manually try to opt-out of spam – Blue Frog opens an HTTP session with the spamvertised site, visits the site according to the flow of instructions included in the script and posts the opt-out text in forms found on the Web site, such as registration or purchase forms.

Opt-out requests do not contain any information that may jeopardize the users’ privacy. The Request encourages the merchant, email marketers and spammers to download the Registry Compliance Tools, remove all e-mail addresses listed in the Registry from their mailing lists and stop sending spam to Blue Security customers.”

Now, before you rush to your own and their defense, really read what this says. It says that it takes information and populates webforms. It doesn’t submit a real opt-out request, and if it did, it wouldn’t do any good, because spammers don’t honour opt-out requests.

Instead it goes to whatever website is there, and finds whatever webforms it can, and puts “unsubscribe me” language in that webform, no matter what that webform is, no matter to whom it actually belongs.

Your own computer may only send a few to each site, but to how many sites is it sending? And combined with however many others are being sent at the same time to the same site from the thousands that Blue Frog claims, that is the very definition of a DDOS.]

The Internet Patrol is completely free, and we don't subject you to ads or annoying video pop-ups. But it does cost us out of our pocket to keep the site going (going on 20 years now!) So your tips via CashApp, Venmo, or Paypal are appreciated!
Receipts will come from ISIPP.

CashApp us Square Cash app link

Venmo us Venmo link

Paypal us Paypal link

Get New Internet Patrol Articles by Email!


Share the knowledge

22 thoughts on “Blue Frog “Do Not Spam” Email List Stolen and Spammed

  1. I tried bluefrog for a few days after the latest version of mailwasher came with its functionality built in… and was suggested by the mailwasher people…

    After 90% of spam I tried to report was refused by Bluefrog anyway… I gave up and stopped using it.

    Since the spamming fiasco started I now get hundreds of spoofed bounces every day and have done for the last 4/5 days.

  2. [quoted from Death to Spammers above]
    —–snip—-
    “Title 18 U.S.C. 1030(5)(A) states:

    “through means of a computer used in interstate commerce or communications, knowingly causes the transmission of a program, information, code, or command to a computer or computer system if:
    (I) the person causing the transmission intends that such transmission will –
    (I) damage, or cause damage to, a computer, computer system, network, information, data, or program; or
    (II) withhold or deny, or cause the withholding or denial, of the use of a computer, computer services, systems or network, information, data or program.�

    It can’t be any clearer than that. Blue Fog is using YOUR computer as part of their DDOS. It’s illegal.
    —–snip—-

    Dear Death to Spammers,

    I can’t believe you use that nickname and still don’t understand how the Frog works.

    But my point is, look at the last part of Title 18. That is exactly what the spammers are doing to me: “withhold or deny, or cause the withholding or denial, of the use of a computer, computer services, systems or network, information, data or program” – the program is my mail client… the spammers are denying me the use of my own inbox.

    John

  3. Blue Frog is Great! Let the spammers keep sending their spam. For each spam I recieve their sponsors or customers get an automatic opt-out request from me. How can that be considered a DOS attack?

    If each installed frog sent out more than one opt-out per email, then yes it could be considered DoS, but if you read Blue Security’s website the automatic opt out is a last resort, and each spamsite is verified by a living person.

    First the spammers sent out mass mailings, then they sent out fake spams from companies that they didn’t represent, and finally they are trying to blackmail us by sending out spams in the name of Blue Security itself.

    Each one of these tactics has failed, and each one of those fake spams costs the spammers money.

    I doubt very much that spam will ever be eliminated, but if Blue Security can make it costly for these bastards to operate, then so be it. If it is declared that what Blue Security is doing is illegal, then I would count myself one of their partners in crime.

    I have actually signed up for a few more email addresses hoping to get more spam, which will make it that much more costly for the spammers.

    Blue Frog is the first tool available to people that lets them strike back at the spammers where they hurt. The fact that this russian spammer started this ‘spamwar’ is proof of that.

  4. Hey know1, if you’re already getting spammed why not download the blue frog again (but only from blue security) and join all the rest of us in fighting those morons? They are the real enemies and lawbreakers. Let’s all get together and put them out of their misery like shooting a horse with a broken leg!

  5. This is a most fascinating article. When I originally reviewed Blue Frog for a technical article I was preparing I was doubtful whether it was a viable solution so I rejected it. Now however, it is clear to me, and many others too, that the spammers are squealing simply because they have been really hurt. So hurt and angry that they have actually emailed people telling them that they will increase their spam!! Admitting that spam will increase unless a person unsubscibes from Blue Frog is less than sensible and I suspect that they will live to regret this mistake. I shall now lend my support to Blue Frog.

  6. I installed BlueFrog AntiSpam as I found it at addons.mozilla.org —as an extension to my Firefox browser. Had NO CLUE about all this behind-the-scenes warfare or that I’d be part of it. I removed BlueFrog just 2 wks after installing as I found it to be a CPU & RAM hog. But a few days ago, I rec’d an email to my primary Gmail acct stating BlueFrog is a SCAM all of it’s own.. That it’s not located in the USA but is run by “a couple of Russian Jews with offices in Tel-Aviv” (quote). It went on to add that in exactly 2 days I’d be receiving spam unlike I’d ever seen before.

    AND THE SPAM CAME!! And the same date & mass quantities as they warned. Who were the sender of the warning email? Maybe I should’ve saved it? But I didn’t. Didn’t know what to believe.

    I was just relieved that I’d removed BlueFrog months ago. Now I’m seeing BlueFrogSetup.exe in several places in my PC—apparently that was Not a clean uninstall. Wonder if these entries are putting my machine in a compromising position???

    What seemed like a revolutionary GREAT IDEA then leaves me feeling far from great right now. And being hit with appx 100 spams-a-day is only part of it. Also wondering if the same involvement will ‘infect’ my other email addresses as BlueFrog was “protecting” multiple Gmail’s AND Yahoo mail. What a mess! Anything at all I can do at this point? Thank you for listening.

  7. To “Death to Spammers”, no, it is NOT illegal to send opt-outs to spammers. If they provided legitimate opt-out links as required by law and complied with those requests, they wouldn’t be sent anything by Blue Frog. It is everyone’s legal right to request being removed from a spammer’s list, and to respond in that manner to every single piece of spam that is sent. Your login name is obviously a farce, and your legal skills could use some brushing up.

  8. What the hell is wrong with all of you Blue Frog lemmings? Don’t you CARE that you are doing something ILLEGAL?

    If a telemarketer calls you, over and over, even if it’s collect and they somehow force you to accept the charges, you are not allowed to go to their home or office and trash the place. You are not allowed to go to their home or office and throw a “take me off your list” note through their window. It doesn’t matter if you throw only one note per call you’ve received. And if you do it as part of a mob, each throwing one note per call through their window, and you damage their house, or make it impossible for others to get in or out of the building, guess what? You have broken the law.

    Now in the case of Blue Fog, you bet that what you are taking part in is a DDOS, and you bet that IT IS ILLEGAL!

    Here is the Federal law making it illegal:

    “Title 18 U.S.C. 1030(5)(A) states:

    “through means of a computer used in interstate commerce or communications, knowingly causes the transmission of a program, information, code, or command to a computer or computer system if:
    (I) the person causing the transmission intends that such transmission will –
    (I) damage, or cause damage to, a computer, computer system, network, information, data, or program; or
    (II) withhold or deny, or cause the withholding or denial, of the use of a computer, computer services, systems or network, information, data or program.”

    It can’t be any clearer than that. Blue Fog is using YOUR computer as part of their DDOS. It’s illegal.

    And guess what. Blue Fog doesn’t give a fuck that they are having you break the law because THEY are sitting in Israel where they can’t be touched, with a great wodge of VC cash, laughing all the way to the bank.

  9. Did you bother doing any research before posting this article? First of all, the spammers are using pre-existing lists. People who have not subscribed to Blue Frog are getting the threats, and only few of those who have subscribed are. Your reporting is 100% irresponsible, unprofessional, and incompetent.

  10. This article is factually incorrect. Blue Security does not try to cripple the spammer’s server as is the case with a DoS attack. It submits one opt-out request per spam reported by its members. This is absolutely no different from every user of Blue Security submitting an opt-out by himself. This is also essentially what you do when you report spam to Blue Security. You have to forward the spam as an attachment. This is a message to Blue Frog that tells them, “I want to be opted-out of this emailer’s list”. Blue Security then finds a way to submit opt-out requests and fulfills its promise to its users to do so.

    This is no DoS attack as it is directly proportional to the number of opt-outs that Blue Security receives from its users. This works because it uses up spammers’ bandwidth and time. The site doesn’t usually go down. They just have to pay for the bandwidth that they wasted by sending so many spam emails.

  11. Someone is utilizing the tbe BF list to transmit spam or has determined a methodology to correlate that list against real systems. I get emails like this every few hours, and I have over 14000 emails in my SPAM Catcher.

    “Hey,

    You are recieving this email because you are a member of BlueSecurity ).

    You signed up because you were expecting to recieve a lesser amount of spam, unfortunately, due to the tactics used by BlueSecurity, you will end up recieving this message, or other nonsensical spams 20-40 times more than you would normally.

    How do you make it stop?

    Simple, in 48 hours, and every 48 hours thereafter, we will run our current list of BlueSecurity subscribers through BlueSecurity’s database, if you arent there.. you wont get this again.

    We have devised a method to retrieve your address from their database, so by signing up and remaining a BlueSecurity user not only are you opening yourself up for this, you are also potentially verifying your email address through them to even more spammers, and will end up getting up even more spam as an end-result.

    By signing up for bluesecurity, you are doing the exact opposite of what you want, so delete your account, and you will stop recieving this.

    Why are we doing this?

    Its simple, we dont want to, but BlueSecurity is forcing us. We would much rather not waste our resources and send you these useless mails, but do not believe for one second that we will stop this tirade of emails if you choose to stay with BlueSecurity.
    Just remember one thing when you read this, we didnt do this to you, BlueSecurity did.

    If BlueSecurity decides to play fair, we will do the same.

    We are quite sure you will think this will not continue, that we will not continue wasting our resources doing this, feel free to wait out the first 48, or the second, and see whether these stop, you will be quite suprised.

    If you have another email under the protection of bluesecurity, and have not recieved this there, do not worry, you will soon enough.

    We mightve had your email addresses before in our lists, but now, we are targetting YOU, because YOU are a bluesecurity user.

    You might also notice, that the BlueSecurity site(http://www.bluesecurity.com) is down..

    Just remove yourself from BlueSecurity, and make it easier on you.”

  12. For a website which is supposed to allay people’s fears about internet security and issues such as spam etc., you sure are doing a good job of looking like you are sponsored by the very people who perpetrate these crimes and violations to our privacy and safety!

    The BlueFrog list has NOT been stolen and whoever claims to have seen this stolen list is quite frankly misinformed. It is perfectly feasible that spammer(s) have used their own existing lists, put them through the Blue Security washing process and come up with a list of people who are on the Blue Security registry. This however is a world away from actually having the list from Blue Security; if you had spent any time actually investigating this matter it would have become patently clear to you that the spammers only have the addresses that they already had in the first place. Whilst it is true that they now know who is signed up to the BlueFrog service, this is ONLY as a subset of their existing database and nothing new.

    So, this may mean a little more spam for those users who have their addresses registered with BlueFrog AND on a spammers list, but this only serves to indicate that the spammers are getting desperate – if it wasn’t causing them a problem there would be absolutely no reason for them to send these attacks and threats out. Bring it on I say, all the more fuel for Blue Security to send back to the spammers.

    Quite frankly, I am more concerned with leaving my real email address on this board than I am about it being in the BlueFrog system…

  13. This is great. This is exactly what I expected when I signed up to Blue Frog: that spammers would start to get seriously annoyed by our requests for removal. I can’t believe it’s working so well. That these guys should be spending so much time and effort, tying up their servers in trying to knock out Blue Frog is fantastic. Now they might start to get an idea of just how much hard work it is for us spam sufferers to filter their rubbish. And the big gag is that every time they send out their spam which they have increased for the time being, they will just get more complaints back. How good is that? They are just generating more and more requests for themselves to have to filter. They might knock out the Blue Frog website, but they can’t knock out each and every blue frog application on each and every PC, so the requests will continue. The blue frog goes on. Mine has been working solidly for the last 72 hours. I leave it on overnight now, to ensure that it is forever retaliating. And it costs me no effort at all. I have to delete spam anyway, so instead of putting it in the deleted items bin, I send it to blue frog. No extra effort at all. Whereas those guys are wasting their energy and resources trying to beat us. It’s great! Bring it on. We’ll break them.

  14. Relax people, it’s a con. The database is perfectly secure: they are merely mailing people they already have and who are on it. As long as we keep reporting the mails, they continue to lose money.

    Real Tech News has the story: Spammer Desperately Tries to Undermine Blue Security

  15. I read the transcript above, and it is so funny. I particularly liked “Their unfair tactics = DDoSing sponsors” and “if it wasn’t for us mailers trying to make an honest living”.

    Where do these juvenile fucks come off. Here they are stealing bandwidth and time from virtually everybody in the world, and they have the warped idea that trying to stop their sociopathic behavior is wrong!

    First off, there is no DDOS attack. If you send out a million pieces of garbage, you should expect a million complaints back. That’s the service that BlueSecurity offers.

    Since spammers hide, and use bots to so their dirty work, the only way to complain is for their victims to go to their customers.

    I hope they keep spamming me. I’ll report every spam, and hope and pray that every one I report causes them to lose another bot, and another customer.

    Retards!

  16. Your article states, and I quote:
    “To be more clear, when you sign up for Blue Frog’s service, and give them your email address, any time someone spams you, they spam that someone back …”

    Excuse me, but do you know the meaning of spam? And how do you equate posting an opt-out,
    (one per aggrieved recipient) as defined in the CAN-SPAM act, as spam?

    Please try to be factual, truthful, and unbiased, like reputable journalists. This misrepresentation is shoddy journalism at its worst.

  17. Here is a transcript of the criminal spam attack plans by the perpetrators. The standard of the language is not of my choosing.

    Transcript begins
    Logged in as: FoGGeR

    >killthem

    As many of you here running here websites and being attacked from this fuckers.

    Do no clean your lists because they will ask you clean your lists every fucking week they by day they have more and more users signed in.
    we have the database of the users that are signed in blue system and we’re going to fight them.
    all sponsors contact me to get the data base and ask your mailers to over spam that database and take down this lamers …

    waiting for your posts
    ====================================== Date 4/30/2006 4:52:25 AM
    >LCS

    … (in reply to killthem)

    those fuckers must die and they will.
    ====================================== Date 4/30/2006 4:53:57 AM
    >killthem

    … (in reply to killthem)

    Right i’ll post database most mailers can use the emails as from most can clean and give us more lists.
    ====================================== Date 4/30/2006 5:39:11 AM
    >LCS

    … (in reply to killthem)

    anyone actually using those emails as froms now? we need to stick together in this fight against bluesecurity and their unfair tactics.
    ====================================== Date 4/30/2006 6:51:53 AM
    >killthem

    … (in reply to killthem)

    The war will start tomorrow but as i know already some people started mailing the database.

    Contact me for database i already have it
    ====================================== Date 4/30/2006 9:50:15 AM
    >starriol

    … (in reply to killthem)

    Which are their unfair tactics? What are they going to start tomorrow?
    ====================================== Date 4/30/2006 2:49:49 PM
    >Shinjiro

    … (in reply to killthem)

    Their unfair tactics = DDoSing sponsors
    The war supposively starting tomorrow[which I don’t see helping any] = spamming them even harder

    -Shinjiro
    ====================================== Date 4/30/2006 5:48:17 PM
    >dollar

    … (in reply to killthem)

    Word through the underground is pretty solid right now. Bluesecurity is going to be hit with forces they will not be able to handle. We will see.

    “Slap an anti a day to keep spamhaus away”

    Great Affiliate Programs
    Custom Bulk Applications
    BP Mailing/Hosting/Direct Servers
    Contact Me

    ====================================== Date 4/30/2006 5:52:10 PM
    >Shinjiro

    … (in reply to killthem)

    LOL. This is from the Blue Security website.

    quote:

    Email marketers and spammers alike have a strong incentive to remove the addresses listed in the Do Not Intrude Registry from their mailing lists and stop sending unsolicited bulk mail to Blue Security customers.

    Strong incentive to remove the addresses listed in the DNI Registry huh?
    We’ll see what happens tommorow. This should be very interesting when their clients pay to be on this registry but get bombarded with mail anyway.

    _____________________________

    -Shinjiro
    ====================================== Date 4/30/2006 6:28:57 PM
    killthem

    … (in reply to killthem)

    Ok who can mail this databases and make it to be from emails ?
    ====================================== Date 4/30/2006 6:49:31 PM
    >LCS

    … (in reply to killthem)

    quote:

    Ok who can mail this databases and make it to be from emails ?

    pm me the link to the database. i’ll pass it on to the mailers.
    ====================================== Date 4/30/2006 6:59:35 PM

    >LCS

    … (in reply to killthem)

    take a look at this guys:
    Be sure spammers don’t use our domains for spoofed From headers too!
    AlanJayWeiner – 11:10am Mar 15, 2006 EST

    Those of us with our own domains receive lots of false “bounce” messages – spammers spoof the From header, and other servers bounce a “no such address” back to us.

    These seem to have exploded lately – I was getting 1700-1800/day a couple of months ago, now I’m seeing around 4000/day. (it’s 10am as I post this, and I’m already at 2462 bounce messages – I’m forwarding them all of course; the cool part is my Blue Frog rank is *18*! But that’s a contest I don’t want to win…

    Please be sure that spammers don’t *just* clean their lists of our email addresses and domains – be sure they stop using our domains in the spoofed headers too!

    Doesn’t help much if the 100 spams to me personally are eliminated but the bounces go up by thousands… (grrr!

    – Al –
    ——————
    Re: The End of the Beginning
    captgosnold – 06:05pm Apr 25, 2006 EST
    Community Moderator

    I hope everybody read Eran Reshef’s post from earlier this week. It is great news and is likely a harbinger of great news to come, provided we all keep doing what we’ve been doing — reporting spam and keeping our frogs on line.

    I will admit that six months ago I had some doubts about the Blue Frog program. My biggest worry then was that the Blue Security staff would be naive about the extent to which the spammers would take countermeasures against the frog. Eran and his collegues have completely erased that worry from my mind. This latest news tells me that they have been bobbing and weaving with all the tricks the spammers play, and they have made our frogs effective despite them.

    The worst of the spammers have a rather-fight-than-comply mindset that seems completely unreasonable. Yet our frogs have persuaded one of the worst of the spammers to give up the fight. With time others will too.

    I’m looking for the software pirate spammers to be next to hang up the gloves. We’ll see. But I have no doubt that further good news is coming.

    At the beginning of the Blue Frog program I read many postings in other newsgroups, which, for many reasons, said it would never work. To those naysayers back then, let me continue Eran’s usage of Churchillian rhetoric — “Some chicken! Some neck!”
    ——————
    those comments make me sick.
    lets see what happens tomorrow then.
    ====================================== Date 4/30/2006 7:20:32 PM
    >killthem

    … (in reply to killthem)

    pm sent.
    ====================================== Date 4/30/2006 7:20:43 PM
    >zMACk

    … (in reply to killthem)

    why not use thier domains as froms and build an email ad that rotates them then mail to your worst anti/complainer lists would bring them some serious heat

    for example

    Hey check out my site #RND_URL

    Want a Remove Link “Tough Shit”

    basicly piss off the antis

    its an idea and im sure it would work quite nicely.

    Shoot me the Database Ill get working on it as well

    _____________________________

    ====================================== Date 4/30/2006 9:29:04 PM
    >ryans

    … (in reply to killthem)

    ” AlanJayWeiner” sounds like a real weeeeeennnneerr too me!
    Fuck them, use them as froms

    _____________________________

    “Screw the Anti-Spammers
    They wouldn’t have anything ‘better’ to do
    if it wasn’t for us mailers trying to make an honest living”
    ====================================== Date 4/30/2006 9:48:55 PM
    >cappeonghe

    … (in reply to killthem)

    I am in, please pm me
    ====================================== Date 5/1/2006 1:14:36 AM
    >ebulker

    … (in reply to killthem)

    guys, you can spam their services with a text that they provide paid DDOS services and attache their contact info. This might help to destroy them.

    _____________________________

    Here is what you’re looking for: Link removed by moderator for security reasons Right and easy way to make BIG money!
    ====================================== Date 5/1/2006 5:02:10 AM
    >killthem

    … (in reply to killthem)

    Database in our hands.

    Lets show them who we’re.
    bulkaboyx
    I’m still new here…

    … (in reply to killthem)
    No New Messages
    Hi

    Recieved 90% of their whole database, this includes all updates up to this very moment

    Enjoy and REMOVE ;)
    Report Abuse | Date 5/1/2006 7:12:56 AM

    >killthem
    I’m still new here…

    Posts: 9
    Joined: 4/30/2006

    … (in reply to bulkaboyx)
    No New Messages
    FoGGeR lol yeh sure am a fed and you a blueguy :)

    anyway fuck you and your company we’re fighting you and i recived around 100 pvt msgs telling me that they’re with me.

    No need to remove them we’ll just show them who we’re.

    Thanks

    >ebulker
    Member

    Posts: 225
    Joined: 7/6/2005

    … (in reply to bulkaboyx)
    No New Messages
    bluesecurity guys have nothing in common with FTC,FBI,DEA, whatever etc
    They are owned by russian guys, maybe unlucky spammers in the past but knowing DDOS technologies under trojaned networks and decided to get some extra money in anti-spam business in such unusual way….

    Let’s work as a team destroying their business and protect our interests together!

    _____________________________

    Here is what you’re looking for:

    icq# 333192431
    Right and easy way to make BIG money!

    killthem
    I’m still new here…

    … (in reply to bulkaboyx)

    ebulker

    this people are idiots, they really think they can stop us, u can contact me and will provide lists and some more info.
    and bout the ddos part i already asked some biggest team in the world to work out something for me they’re working on that project which will make bleu down for weeks months and so on hope i can show that soon here how this idiots going down
    Report Abuse | Date 5/1/2006 1:45:35 PM

    >ginsta

    … (in reply to bulkaboyx)
    No New Messages
    I’ve downloaded the db…. Let me know when to start :)
    Report Abuse | Date 5/1/2006 4:15:12 PM

    >killthem

    … (in reply to bulkaboyx)
    No New Messages
    ginsta

    Start now.

    contact me for texts and more emails

    lets rock :)

    Transcript ends

  18. The subset of the spamming community have engaged in a criminal activity to threaten members of the Blue Security community. They have not been able to decypher the Do Not Intrude Registry. Instead, they have run the Blue Security com[pliance tool against their own spam address book, and observed which addresses were removed. They have deduced that the addresses removed must all belong to Blue Security, and are mounting a vicious campaign of email containing libellous accusations and distortions.

    The registry compliance tool will not reveal any addresses that were not already in the spammer address book. It it will result in many “false positives” – meaning that the spam attack directed at the Blue Security community will also arrive in the mailboxes of many other innocent victims. “Collateral damage” they will call it.

    It remains to be seen whether this will harden the resolve of Blue Security members. First indications are that they are not at all fazed, and have been ready for this for some time.

    What’s more, this attack is coming from the spammers’ own bot-net of caprured zombie machines. As these spams are reported to Spamcop and to Blue Security, it offers an ideal oppoerunity to identify and nullify just their specific bot-net – something that their plans did not consider.

    The battle has begun. May 2, 2006.

  19. Did you really see the hateful, anti-semitic email sent by those spammers? It says, among other lies, that “BlueSecurity is run by a few Russian-born Jews, who have previously been spamming themselves”.

    You don’t have to love Blue Security, but at least don’t help spammers spread their lies.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.