Archive for the 'Spam' Category

This guy will ask spammers to stop spamming you in exchange for links!

The beauty just came into my blog’s spam filter this morning:

Name: Anikrichard | E-mail: | URI: *spamlink* | IP: 72.9.235.218 | Date: September 5, 2007

hello , my name is Richard and I know you get a lot of spammy comments ,
I can help you with this problem . I know a lot of spammers and I will ask them not to post on your site. It will reduce the volume of spam by 30-50% .In return Id like to ask you to put a link to my site on the index page of your site. The link will be small and your visitors will hardly notice it , its just done for higher rankings in search engines. Contact me icq or write me , i will give you my site url and you will give me yours if you are interested. thank you

This is one of the more appealing spam emails I’ve seen - in return for him doing you a favour, and asking the nasty spammers to stop, all he wants is a link to his site.

I don’t have the time myself, but someone should talk to this guy and get his URL to ‘add a link’, then send him off the the Google Webspam team. Would be fun to see what happens. If anyone wants to take it on, let me know - I would love to see how it turns out / how quickly the guy is banned.

Dreamhost leaks 3,500 FTP passwords

**** Update: After all this Dreamhost mess, I’ve decided to abandon ship and go to Lighthouse Technologies for hosting, since I know the owner, and can vouch that he is solid. His best plan is $16 / mo, but bound to be more reliable and secure. If you want to get hosting with Lighthouse, please consider using my affiliate link! ****

I just recieved this email from Dreamhost. It seems that they’ve leaked 3500 FTP account passwords somehow.

That explains a lot - about 2 weeks ago, someone used my password to upload tons of spam links to my sites. At the time, I contacted Dreamhost indicating the problem, and they assured me that their servers were secure, and it *must* be my problem. Looks like it wan’t me.

From: DreamHost Security Team
Subject: URGENT: FTP Account Security Concerns…

Hello -

This email is regarding a potential security concern related to your
‘XXXX’ FTP account.

We have detected what appears to be the exploit of a number of
accounts belonging to DreamHost customers, and it appears that your
account was one of those affected.

We’re still working to determine how this occurred, but it appears
that a 3rd party found a way to obtain the password information
associated with approximately 3,500 separate FTP accounts and has
used that information to append data to the index files of customer
sites using automated scripts (primarily for search engine
optimization purposes).

Our records indicate that only roughly 20% of the accounts accessed -
less than 0.15% of the total accounts that we host - actually had
any changes made to them. Most accounts were untouched.

We ask that you do the following as soon as possible:

1. Immediately change your FTP password, as well as that of any other
accounts that may share the same password. We recommend the use of
passwords containing 8 or more random letters and numbers. You may
change your FTP password from the web panel (”Users” section, “Manage
Users” sub-section).

2. Review your hosted accounts/sites and ensure that nothing has been
uploaded or changed that you did not do yourself. Many of the
unauthorized logins did not result in changes at all (the intruder
logged in, obtained a directory listing and quickly logged back out)
but to be sure you should carefully review the full contents of your
account.

Again, only about 20% of the exploited accounts showed any
modifications, and of those the only known changes have been to site
index documents (ie. ‘index.php’, ‘index.html’, etc - though we
recommend looking for other changes as well).

It appears that the same intruder also attempted to gain direct
access to our internal customer information database, but this was
thwarted by protections we have in place to prevent such access.
Similarly, we have seen no indication that the intruder accessed
other customer account services such as email or MySQL databases.

In the last 24 hours we have made numerous significant behind-the-
scenes changes to improve internal security, including the discovery
and patching to prevent a handful of possible exploits.

We will, of course, continue to investigate the source of this
particular security breach and keep customers apprised of what we
find. Once we learn more, we will be sure to post updates as they
become available to our status weblog:

http://www.dreamhoststatus.com/

Thank you for your patience. If you have any questions or concerns,
please let us know.

Increases in Referral Spam

Has anyone else noticed an increase in referral spam in the last two weeks? I am seeing almost 500 referral spam hits per day, with more somedays. This is particularily annoying to me since I am using Dax’s referral RSS feed in order to keep an eye on my referrals… this recent trend is making that more or less useless now!

I wouldn’t mind some input from comment spammers - how effective is comment spamming? What kind of a return do you get on it?

At any rate, back to your regular scheduled programming….