By Brian Krebs
Special to The Washington Post
Wednesday, May 17, 2006
Eran Reshef had an idea in the battle against spam e-mail that seemed to be working: he fought spam with spam. Today, he'll give up the fight.
Reshef's Silicon Valley company, Blue Security Inc., simply asked the spammers to stop sending junk e-mail to his clients. But because those sort of requests tend to be ignored, Blue Security took them to a new level: it bombarded the spammers with requests from all 522,000 of its customers at the same time.
That led to a flood of Internet traffic so heavy that it disrupted the spammers' ability to send e-mails to other victims -- a crippling effect that caused a handful of known spammers to comply with the requests.
Then, earlier this month, a Russia-based spammer counterattacked, Reshef said. Using tens of thousands of hijacked computers, the spammer flooded Blue Security with so much Internet traffic that it blocked legitimate visitors from going to Bluesecurity.com, as well as to other Web sites. The spammer also sent another message: Cease operations or Blue Security customers will soon find themselves targeted with virus-filled attacks.
Today, Reshef will wave a virtual white flag and surrender. The company will shut down this morning and its Web site will display a message informing its customers about the closure.
"It's clear to us that [quitting] would be the only thing to prevent a full-scale cyber-war that we just don't have the authority to start," Reshef said. "Our users never signed up for this kind of thing."
Security experts say the move marks a disheartening development in the ongoing battle by computer users, online businesses and law enforcement against those who clutter e-mail inboxes with a continuous glut of ads for drugs, porn and get-rich-quick schemes. According to Symantec Corp., maker of the popular Norton antivirus software products, more than 50 percent of all e-mail sent in the latter half of 2005 was spam.
Alan Paller, director of research for the Bethesda-based SANS Institute, a computer security training group, said extortion attacks have exploded in the past few years. With Blue Security, Paller said, the attackers' extortionist demands were that the company merely stop interfering in a multimillion-dollar spam operation.
"We're hearing from federal law enforcement that they are getting more than one new case of online extortion each day," Paller said.
The spammer's counterattack generated so much Internet traffic that it also affected other sites, including Six Apart Ltd., a San Francisco-based company that runs millions of Web sites through its TypePad and LiveJournal blogging services. The attack also shut down operations for roughly 12 hours at Tucows Inc., a Toronto-based Internet services company that helped manage Blue Security's site.
Tucows chief executive Elliot Noss called the attack "by far the largest the company had ever seen," and said that only a handful of companies have the infrastructure in place to withstand such an assault, much less a more powerful one.
"This attack really was like trying to take out a mosquito with an atomic bomb," Noss said.
The FBI is investigating the attacks, according to Six Apart, but agency officials would not confirm a federal investigation yesterday.
Todd Underwood, chief of operations and security for Renesys Corp., a company that monitors Internet connectivity, called the attack against Blue Security "unsurprising but sad."
The innovative approach in the fight against spam caught the attention of investors in 2004, when Blue Security received more than $4 million in venture capital, but critics questioned whether the company could win such a massive battle.
"When the company's founders first approached the broader anti-spam community and asked them what they thought of the idea, everyone said this was a terrible idea and that they would eventually cause a lot of collateral damage," Underwood said. "But it's also extremely unfortunate, because it shows how much the spammers are winning this battle."
Brian Krebs is a staff writer for washingtonpost.com