Current Status

This blog is not frequently updated because most case-by-case scam reports are now listed in subordinate blogs. At this point in time, most of my efforts are targeted at documenting employment scams in the Suckers Wanted blog.


Joe Job: and

Not every spam that's sent is designed to sell something or defraud you. Another insidious form of spam is the "Joe Job", in which a disgruntled third party impersonates someone with the intention of generating backlash against that party. I've been on the receiving end of this myself.

At the moment, a company called "Blue Security" is on the receiving end of a lot of flak from an irate spammer, and the spammer is using all the sleazy tactics common to spammers -- including "Joe Jobs" -- to wreak his revenge. I found an instance of this "Joe Job" spam in my junk folder today. There's absolutely no evidence that it originates from Blue Security, and plenty of circumstantial evidence that it is the work of the spammer called "PharmaMaster" who is currently harassing them.

How do you identify a Joe Job like this? The most telling sign is the abundance of contact information. Spamming is old hat by now, and spammers have known for ten years or more that providing accurate contact information is a sure way to get bombarded with complaints. In this case, that's the intention: PharmaMaster wants Blue Secutiry to get bombarded with those complaints, and preferably for their service providers to throw them off due to complaints.

Also note that although the message has a fairly straight-laced "press release" kind of feel to it, it advertises the use of a "botnet" to simulate "DDoS" attacks. One of the allegations PharmaMaster has been spreading is that Blue Security is using their "Blue Frog" download to create a "botnet". It's true that downloading and executing software like "Blue Frog" is a very trusting action (and I want to make it clear that I don't endorse or recommend "Blue Frog"), and Blue Security could in theory use Blue Frog downloads to create a "botnet", but the suggestion that they are doing so is rather incredible because it would be like committing a crime in broad daylight on a busy street. Thus, I conclude that this is PharmaMaster manufacturing evidence to bolster his self-serving and outlandish claims.

This particular spam was received from a host inside the netrange (controlled by Shaw Communications, Canada) -- probably a compromised PC, and thus probably part of a botnet controlled by PharmaMaster himself. It was sent to a legacy address that's been on spammer lists for years. The text of the Joe Job follows.

Skybox Security Solutions

Simulated DDoS Network Attacks and Network Intrusions

Customer Challenge:
Large corporations often hire consultants to conduct quarterly penetration (DDoS)
testing on specific segments of their corporate network. This testing can cost over
hundreds of thousands of dollars, and also exposes the network to many potential
disruptions. These disruptions are the result of the intense DDoS attacks testers
can impose on live networks in order to isolate vulnerabilities and weaknesses.
Since the network is constantly changing, and DDoS attacks are rarely dispersed
from a centralized location, the penetration test results often become nullified and
end up being limited to a small portion of the total network.

The Skybox Solution:
Skybox Security performs accurate and non-intrusive DDoS attacks across a larger
portion of the corporate network. The tests are modeled and analyzed through an
automated process via our large botnet network rather than manually performed on a
live network. As a result, the tests are repeated rigorously on a scheduled basis
without any fear of network disruption. Through DDoS attack and access simulation,
vulnerability exposures as well as security control weaknesses are revealed instantly.

DDoS attack simulation discovers all possible attack scenarios and reveals the step
by step process that an attacker or worm may follow. It illustrates specific vulnerabilities
to be exploited and network access traversed for each exploitable path. Access simulation
calculates network access privileges determined by firewall and routing configuration.
Our botnet helps characterize the interconnectivity between any two given points, reporting
not just whether access is possible, but also the detailed path to reach a final destination.
Based on these combined results, security personnel are able to determine what additional
DDoS attacks are necessary and where to deploy our organizations penetration testers.

Info Security - Info Security Hot Companies 2006

The Wall Street Journal - One of the most innovative companies in 2005
Information Security Magazine - Product of the year
Network Magazine - Most Visionary Security Product
Network Magazine - Best of the Best in all categories
Secure Enterprise Magazine - Editor's Choice
Gartner - " Cool Vendor " in the security & privacy space
SC Magazine Awards 2006 Winner - The Best Security Solution for Financial Services
IM2005 Award finalist - Information Security and Product of the Year

Company Profile:
Eran Reshef

Founder, Chairman & CEO of Blue Security ( )

A serial entrepreneur, Eran is currently the founder, chairman & CEO of Blue Security,
the do-not-disturb registry pioneer. Prior to Blue, Eran co-founded Skybox Security and
served as its Chairman. Prior to Skybox Eran founded and managed Sanctum (acquired
by WatchFire), the leader in web application security. Eran holds a variety of security-
related patents that are based on his inventions.

Rina Shainski
General Partner at Carmel Ventures ( )

Following a successful career leading business development and R&D operations in
high-growth software companies, Rina has been investing in software companies ever since.
Before joining Carmel she served as the VP Business Development at Clal Industries and
Investments where she was responsible for software investments. From 1989 to 1996, Rina
held several managerial positions in Tecnomatix including VP Business Development and
R&D Director. Rina serves on the boards of Followap Communications, Skybox Security,
mFormation and Silicon Design Systems. Rina holds a B.Sc. degree in Physics from Tel
Aviv University and a Master of Science degree in Computer Science from Weizmann Institute.

Contact Information:
2077 Gateway Place, Suite 550
San Jose, California 95110 USA
Phone: 866-6SKYBOX
Phone: 408 441 8060
Fax: 408 441 8068

Regional Offices (Israel)
60 Medinat Hayehudim St.
P.O.Box 4109
Herzliya Pituach 46140 Israel
Phone: +972-9-9545922
Fax: +972-9-9545933

No comments: