News Blog and Archives:

December 2010

The highest number of spam-spewing computers is in the U.S. -- Is yours one of them?

August 2010

A pleasant discovery, thanks to spammers

Spammers spoofing antispammers' email addresses

June 2010

Google Groups: "This site could harm your computer."

April 2010

Your friend is freaked out at the moment

December 2009

Malware writers vying to violate virgin computers

Fake security scan scamming Skype users

Google scammers take aim at Barack Obama

November 2009

Favicons and fake-icons

Spamit Must Fall

Spamming universities

June 2009

May 2009

April 2009

March 2009

February 2009

January 2009

December 2008


Resource Links

Welcome to! This is a portal to connect you to a variety of online resources in the fight against spamming. But why fight spam?

Spam is about a lot more than unwanted junk email. And it's about more than just stolen bandwidth or people making you pay to receive their advertising.

Spam now makes up over 90% of the email being sent. Spammers mail to people who don't want to receive their messages. And they have to get past filtering by ISP's whose subscribers complain bitterly about receiving large volumes of unwanted email, often with content and images they find offensive.

If you did that, your ISP would maybe warn you once, then they'd tell you to find another ISP. And while there are ISP's that will let you send your spam if you paid them handsomely enough, it's easy enough for spam filtering software programmers to learn which ISP's those are and to block everything coming from their IP address ranges.

So how do spammers get away with it? Most are engaged in criminal activity. They hijack other people's computers to allow them to send their emails or to host the websites their spam advertises. And just to make sure those hijacked hosts are not thrown off the network by their ISP's, they hijack a LOT of people's computers so they can spread the usage around enough to avoid notice. That means they have to create and propagate malware (computer viruses, etc.) to allow them to take over other people's computers. And since their activity is illegal, they have to use fake names to register their domains, and they have to pay for it with stolen credit/debit cards or Paypal accounts.

Spammers just keep getting deeper and deeper in illegal activity in order to keep ahead of all the people who just want to be left alone. And it's ordinary people who are the victims of those crimes. In fact, you may have been sent here for more information because you were warned that your computer was being used by spammers or because your identity and credit card number were stolen.

The links on the left will connect you to some valuable resources in protecting yourself. Becoming educated about criminals is one of the most effective forms of defense. But first and foremost, NEVER buy anything advertised in spam. You don't want to encourage illegal activity, and you definitely don't want people like that to have access to your credit card number!

This site is best viewed in Firefox or Seamonkey browsers. We do not recommend the use of Internet Explorer browser due to the risk of getting infected with malicious software without any warning while surfing the web.


December 4, 2010
The highest number of spam-spewing computers is in the U.S. -- Is yours one of them?

If you're like most people, despite spam filters, your inbox is full of spam advertising fake Rolexes, fake pills from fake Canadians, fake diplomas, fake girlfriends who want to have fake sex, etc. It's all illegal. How do they get away with breaking the law so flagrantly?

Part of the reason is that "they" are usually in countries like Russia, where spamming and scamming is legal, as long as the victims aren't Russian. But how much spam can they send before people stop accepting email from their computers? Can't everybody get together and block them?

We can, and we do, using "blocklists" like those maintained by groups like Spamhaus,, and Project Honey Pot. So why hasn't it stopped the spam?

The problem is that spammers don't have to mail from their own computers. They can mail from other people's computers. They can mail from yours.

How do they do that? By using malware (bad software, like computer viruses). The malware they usually use is called a Trojan horse. Like the famous gift from the Greek army, the victim has to allow it past their defenses. Once inside, it opens the doors from the inside and allows in all its little friends.

Trojans also may be "root kits." That means they insert themselves into the Windows system files that launch early in the boot process, so early that they are already running before your antivirus program launches. They can then evade detection and even inactivate the antivirus.

Having an up-to-date antivirus program is an important way to prevent getting a Trojan, because they are a huge pain to remove once they are installed. But even the very best antivirus cannot detect all malware. The malware authors are constantly changing their code to vary the parts that are detected by AV programs. For an AV program to detect 95% of trojans on the first day they are released is an excellent record, and most don't do that well. But even 95% success means that 1 in 20 new infections slip in unnoticed.

Using common sense, being suspicious about things that arrive in email, being careful about the source of downloaded files (and avoiding illegal downloading), avoiding the use of the Internet Explorer browser and using a browser add-on that turns off javascript and other vulnerable applications unless you specifically enable them -- all those measures help. But even the most astute person can be fooled if a spammer knows personal details about him, or if the spammer just gets lucky guessing. You have to consider the possiblity that your computer is already infected with a Trojan.

Wouldn't you be able to tell? Wouldn't it be running slow? Actually, it may not. The criminals trying to seize control of computers don't want you to get suspicious. They don't want you to get your computer checked for trouble. They may even remove other people's malware to prevent your computer slowing down. They want to have more control over your computer than you do.

Some malware can make itself invisible by removing itself from directories and concealing itself from programs. But some of the most common ones prey on people that don't know how to look for malware. They can be detected easily if you know how to look.

One of the most important ways is to look for attempts to make internet connections to outside computers. A Trojan can't send spam, steal your passwords or identity data, or receive instructions from the criminals controlling it unless it can make an internet connection to another computer.

PC users are used to their computers doing things automagically. They just launch a program and see websites from all around the world. But there are a lot of background processes going on, and there are ways to reveal what is actually happening. Microsoft distributes a free program called TCPview.exe that will show the internet connections your computer is making. That means that except for the cleverest Trojans, you can watch the Trojan actually contacting outside computers and receiving instructions from "command and control" centers.

To use it, download the file to your desktop. Then shut down your browser and as many other programs as you can, as even programs you aren't using may be keeping internet connections in the background to check for updates. Launch and tell it to run. (If it tells you you need to buy a program like WinZip or WinRAR to open it, right-click the zipped folder instead and choose "Extract all" to use the decompression utility built into Windows.) You'll have to click "yes" to a few more dialog boxes, but it is safe to do so.

Once it launches, you will see a list of all the internet connections open on your computer. As new ones open, they will be green, and as they close they will remain visible in red for a while.

If you have shut down all the usual internet programs, there shouldn't be too much activity. There may be some persistent connections to things like Facebook and Google after your browser has closed, but you don't want to see connections to computers in countries in eastern Europe and Asia, you don't want to see connections that use port 25 or smtp, and you don't want to see a lot of ongoing green and red activity when the computer should be dormant.

How do you know where the "remote" computers are located? Copy their IP addresses (numbers that are four sets of numbers from 0-255, for example "") and paste it into the whois lookup at LACNIC. Don't worry about anything that starts with "" or "," as those are numbers given to your own computer or computers inside your own network.

Suppose your tcpview lights up like Times Square on New Years Eve? How do you make it stop? The first thing you can do is install a firewall. Although Windows includes one, it only stops incoming traffic, and it won't stop anything the Trojan has invited in. You need one that stops outgoing traffic, like the free download from Comodo. Then you can get help from a site like or, where experts will guide you through the Trojan removal process. Be prepared for it to take time, as they are far more difficult to remove than to prevent.

Example of TCPview.exe screen: Green entries are new connections. Remote address is, in Russia. The port is "http" since I have it open in my browser, Firefox. (Port 80 is also a browser.) Port 25 or smtp would mean outgoing email. If you don't recognize the programs on the left, you can right-click and look at properties. If I hadn't had my browser open, there would still be connections, but only occasional green lines showing new connections opening.




Reference, tools, and organizations:


How to get help if your identity was used to register a spamvertised website

About us

The InboxRevenge fallback sites

Due to frequent retaliation attacks by spammers, keeps a list of alternate websites where members can remain in contact and continue their spam fighting efforts throughout the duration of attacks: