"November 20, 2004
My Honey Pot catches first spam harvester
It's been a week since I installed a hidden software trap for those who illegally harvest Web sites for e-mail addresses that are then used by spammers.
Here's the original post describing it, part of Project Honey Pot, an ambitious new weapon in the war against spam spearheaded by Matt Prince, CEO of an anti-spam organization called Unspam and an adjunct law professor at Chicago's John Marshal Law School.
Prince tells me my first harvester visited from the IP address: 69.6.66.17. Here's the page that describes the harvester visit and its details.
It happened Tuesday, at 7:02 pm. The harvester moved through my site, looking for e-mail addresses. That's where the Honey Pot came in. It gave the harvester a control address that Prince set up. When spam is received at that address, it links directly back to the harvester.
Whoever is doing the harvesting at this site appears to be running the software on a machine in New Jersey on a connection provided by Comcast. You can find the whois information on the IP here.
Prince says it could be that this is a compromised zombie machine. But the fact that the same IP has acted as a harvester over a 3 week period - he's recorded visits from that IP address to other Project Honey Pot sites - makes him suspicious that there's a real user behind that Comcast connection who is doing the harvesting. It's worth noting that this IP is not listed in most of the big spammer-tracking databases and doesn't appear to be sending ANY spam itself. For example, Spamhaus, SenderBase or dnsstuff.
More evidence that the harvester is not a zombie machine comes from the fact that it is associated with a single mail server (69.6.66.17). Details on that mail server can be found here:
It looks like the spam messages being sent regard a tax deduction scheme involving donated cars and a prescription drug seller.
Here's where it gets interesting.
Unlike the harvester, there's lots of information about the outfit behind the spam. The whois information points to an Illinois-based direct marketing company, Expedite Marketing Corporation.
Expedite has a reputation and, in fact, is alleged to be working with Scott Richter and a number of other high-profile spammers.
However, their corporate presence makes them out to be a legitimate direct email marketer, honoring opt-outs, complying with CAN-SPAM, and, of course, not harvesting. More information is available on the company's website.
According to their site, they do marketing for a major Chicago-area car dealer and a local bank, Prince wonders what the reaction would from their legitimate customers if they knew of some of the other sites of the business. For example, run off the same server, Expedite also hosts Xxxpedite, Adultdesignwebsite and Adult-design-website.
There's also evidence, from the other sites they run, of their very active interest in collecting e-mail addresses - Expedite-email-collector, Buy-email-list and Bulkemailbroadcasting.
Just by sending to a harvested email address Expedite could be violating the law, says Prince. Here is information on the Federal CAN-SPAM Act's prohibitions on harvesting.
I'll follow up as we identify more of these harvesters.
WIth more than 1,000 sites now working with Project Honey Pot, this promises to be an interesting weapon in the fight against spammers. So far, harvesters have grabbed 1,986 Honey Pot e-mail addresses from the participating sites. Seventy-four of those control addresses have already received spam messages. That's led to the identification of 25 harvesters and 51 different spam servers.
Not bad for a start."
mikesjournal