Spam Slammers...
How You Get On A Spam List

One of the reasons our spam slammers have to deal with torrents of junk email is that our email address ends up on numerous spam lists.

Easy To Buy

These lists of email addresses for spamming are available to buy or sell for as little as a few dollars. For instance, Sophos, a security solutions provider, reports that Russia does a brisk business in selling black market e-mail address lists... for as little as $50 per 1 million addresses!

Many of these addresses may not be genuine, but by paying more, the cream of the spam list can be obtained -- the authenticated email addresses of home users on high speed cable or ADSL/Broadband... and already infected with a Trojan for remote access to that computer.

Home Users Susceptible

The reason home users are susceptible to these Trojans is spammers and crackers know that home users are notorious for not keeping their security protection to guard privacy up-to-date. And as ADSL/Broadband is 'always on', there is a greater window of opportunity to access these PCs.

Improve Spam Blocking

By reducing the amount of spam hitting our spam slammers, we also reduce the chances of spam carrying malware through to our inbox. In turn, there is less of a risk of triggering the malware on our computers.

By knowing how our email addresses are acquired to make up these spam lists, we can take greater care to guard privacy when we're in those situations, so reducing the frequency of appearing on those lists.

I'm not saying that all spam will stop or significantly reduce by taking this advice. But combined with the other tips and tools in the supporting articles at the bottom of the page, you will be taking control of spam, rather than the other way around.

Here are the most popular ways our addresses can be 'harvested'...


1. Spam Slammers & Spam Lists...
Spiders

Software programs, known as spiders or bots, can be used to rapidly scan web pages, chat rooms, news groups and online forums to look for email addresses. As addresses are found, the information is transmitted to a mail server and added to a spam database from which lists are compiled.


2. Spam Slammers & Spam Lists...
Dictionary Attacks

A dictionary attack is where a software application connects to a mail server and rapidly submits millions of random e-mail addresses based on words and names commonly found in a dictionary.

The software records which addresses are valid and adds these to the spammer's junk e-mail list. The list can also be sold on to other spammers.


3. Spam Slammers & Spam Lists...
Unscrupulous Websites

Unscrupulous websites offer free software "gifts", entry to a competition, money-making ideas, porn, music etc, in return for an e-mail address.

The e-mail address is validated by successful delivery of the free gift -- confirmed by a download code or a web bug in the email. These addresses are compiled into junk email lists and passed on or sold to spammers.


3. Spam Slammers & Spam Lists...
Other Common Collection Methods

Spammers can quite easily gather lists of email addresses by...

  • Requesting or buying lists of mail addresses from the mailing lists of mail servers
  • Requesting or buying addresses from registration forms and guest books of various websites
  • Searching sites serving as white or yellow pages, where lists of names and mail addresses are featured
  • Using social engineering, such as phishing, to trick recipients into giving out their email addresses, and other secure data

If you'd like to know some of the habits you can get into to reduce your security risk and your chances of ending up on a spam list, then check out the following articles...


Spam Spammers & Spam Lists...
Supporting Articles

  1. The Best Spam Blockers To Protect You From Spam Dangers
  2. What Does Spam Stand For?
  3. Spam Slammers... These Are The Dangers When Spam Gets Through
  4. The Four Types Of Spam Blockers
  5. Practical Steps To Improve the Effectiveness Of Your Commercial Or Free Antispam Blocker
  6. Software Steps To Improve the Effectiveness Of Your Commercial Or Free Antispam Blocker
  7. How To Spam Spammers
  8. Spam Spammers With MailWasher Pro
  9. Phishing And How To Block It
  10. Botnets And Your Zombie PC Fix

New! Comments

Have your say about what you just read! Leave me a comment in the box below.