AOL employee colludes with spammers

Posted by   Virus Bulletin on   Jul 8, 2004

AOL victim of inside job.

An AOL employee was arrested last month and charged with selling the company's customer email list to spammers.

24-year-old AOL engineer Jason Smathers is accused of stealing at least 92 million screen names from AOL's database and selling the information to an associate, 21-year-old email marketer Sean Dunaway.

Dunaway, who was also arrested, is accused both of using the screen names to promote his own business and of selling the information on to other spammers - an initial list for $52,000 and a subsequent updated list for $32,000.

AOL said it discovered the theft during an investigation it carried out as part of legal action the company was taking against another large-scale spammer earlier this year.

A statement from the company read: "We deeply regret what has taken place and are thoroughly reviewing and strengthening our internal procedures as a result of this investigation and arrest."

The news comes only shortly after AOL - as one of the members of the Anti-Spam Technical Alliance - put forward a joint proposal aimed at reducing spam, which stated that spam cannot be stopped unless ISPs take responsibility for the problem.

The Alliance recommends that all ISPs should run spam filters on outbound mail and prevent their customers from sending out more than 500 messages per day, or 100 per hour. Any suspicious accounts, the Alliance says, should be suspended immediately (as, one assumes, should employees found to be in cahoots with spammers).

Posted on 8 July 2004 by Virus Bulletin

 Tags

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.