Blue Security
   HOME

TheInfoList



OR:

Blue Frog was a freely-licensed
anti-spam Various anti-spam techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) as opposed to ...
tool produced by Blue Security Inc. and operated as part of a community-based system which tried to persuade
spammer Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especial ...
s to remove community members' addresses from their mailing lists by automating the complaint process for each user as spam is received. Blue Security maintained these addresses in a hashed form in a ''Do Not Intrude Registry'', and spammers could use free tools to clean their lists. The tool was discontinued in .


Information

Community members reported their spam to Blue Security, which analyzed it to make sure it met their guidelines, then reported sites sending illegal spam to the
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s which hosted them (if they could be contacted and were willing to work with them), to other anti-spam groups and to law-enforcement authorities in an attempt to get the spammer to cease and desist. If these measures failed, Blue Security sent back a set of instructions to a Blue Frog
client Client(s) or The Client may refer to: * Client (business) * Client (computing), hardware or software that accesses a remote service on another computer * Customer or client, a recipient of goods or services in return for monetary or other valuabl ...
. The client software used these instructions to visit and leave complaints on the websites advertised by the spam messages. For each spam message a user received, their Blue Frog client would leave one generic complaint, including instructions on how to remove all Blue Security users from future mailings. Blue Security operated on the assumption that as the community grew, the flow of complaints from tens or hundreds of thousands of computers would apply enough pressure on spammers and their clients to convince them to stop spamming members of the Blue Security community. The Blue Frog
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
included a
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current ...
and
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft which was used in the Windows line of operating systems ( ...
plugin allowing
Gmail Gmail is a free email service provided by Google. As of 2019, it had 1.5 billion active users worldwide. A user typically accesses Gmail in a web browser or the official mobile app. Google also supports the use of email clients via the POP and ...
,
Hotmail Outlook.com is a webmail service that is part of the Microsoft 365 product family. It offers mail, Calendaring software, calendaring, Address book, contacts, and Task management, tasks services. Founded in 1996 by Sabeer Bhatia and Jack Smit ...
, and
Yahoo! Mail Yahoo! Mail is an email service launched on October 8, 1997, by the American company Yahoo, Inc. The service is free for personal use, with an optional monthly fee for additional features. Business email was previously available with the Yahoo! ...
e-mail users to report their spam automatically. Users could also report spam from
desktop A desktop traditionally refers to: * The surface of a desk (often to distinguish office appliances that fit on a desk, such as photocopiers and printers, from larger equipment covering its own area on the floor) Desktop may refer to various compu ...
email applications such as
Microsoft Office Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office and Microsoft 365 software suites. Though primarily an email client, Outlook also includes such functions as cale ...
,
Outlook Express Outlook Express, formerly known as Microsoft Internet Mail and News, is a discontinued email and news client included with Internet Explorer versions 3.0 through to 6.0. As such, it was bundled with several versions of Microsoft Windows, from ...
and
Mozilla Thunderbird Mozilla Thunderbird is a free and open-source cross-platform email client, personal information manager, news client, RSS and chat client developed by the Mozilla Foundation and operated by subsidiary MZLA Technologies Corporation. The projec ...
. Users who downloaded the free Blue Frog software registered their e-mail addresses in the "Do Not Intrude" registry. Each user could protect ten addresses and one personal DNS
domain name A domain name is a string that identifies a realm of administrative autonomy, authority or control within the Internet. Domain names are often used to identify services provided through the Internet, such as websites, email services and more. As ...
. Blue Frog was available as a free add-on within the Firetrust Mailwasher anti-spam filter. It was also compatible with
SpamCop SpamCop is an email spam reporting service, allowing recipients of unsolicited bulk or commercial email to report IP addresses found by SpamCop's analysis to be senders of the spam to the abuse reporting addresses of those IP addresses. SpamCop u ...
, a tool with different spam-fighting methods. Blue Security released all its software products (including Blue Frog) as open-source: the developer community could review, modify, or enhance them.


Spammers' backlash

On May 1, 2006, Blue Frog members started to receive intimidating e-mail messages from sources claiming that the software was actually collecting personal details for identity theft,
DDoS In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connec ...
attacks, creating a spam database, and other such purposes. Blue Security has contested these claims. One variant of the e-mailed message stated that spammers had found a way to extract addresses from the database for malicious purposes. Due to how the Blue Security software works, this is not possible; however, spammers can identify BlueFrog member e-mail addresses in lists they already possess. Blue Security provides spammers a free tool that allows them to "clean their lists". Extracting addresses directly from the program would be impossible as they are just hashes, but a spammer can run a list through the BlueSecurity filter and then compare the results with an unaltered list, and thus identify BlueSecurity users and target them. This method can only identify Blue Frog addresses already in the spammer's possession, and cannot give them access to as-yet-untargeted addresses.


Controversy

In May 2006, the Blue Security company was subject to a retaliatory
DDoS In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connec ...
attack initiated by
spammers This is a list of individuals and organizations noteworthy for engaging in bulk electronic spamming, either on their own behalf or on behalf of others. It is not a list of all spammers, only those whose actions have attracted substantial independen ...
. As its servers folded under the load, Blue Security redirected its own DNS entries to point to the company weblog, which was announcing its difficulty. The company weblog was hosted at the blogs.com webportal, a subsidiary of
Six Apart Six Apart Ltd., sometimes abbreviated 6A, is a software company known for creating the Movable Type blogware, TypePad blog hosting service, and Vox (the blogging platform). The company also is the former owner of LiveJournal. Six Apart is he ...
. This effectively redirected the attack to blogs.com and caused Six Apart's server farm to collapse, which in turn is said to have made some 2,000 other blogs unreachable for several hours. Individuals claiming to be members of the computer security establishment condemned the Blue Security company for the action it took while under DDoS attack. A representative of Renesys likened this action to pushing a burning couch from their house to a neighbor's. In its defense, Blue Security Inc. stated that it was not aware of the DDoS attack when it made the DNS change, claiming to have been " blackholed" (or isolated) in its Israeli network as a result of a social engineering hack, which was alleged to have been pulled off by one of the attackers against a high-tier ISP's tech support staff. This claim has been disputed by many writers such as Todd Underwood, writer of Renesys blog. Most sources, however, agree that regardless of whether Blue Security were "blackholed", they seem not to have been facing attack at the time they redirected their web address. Blue Security also claimed to have remained on amicable terms with Six Apart and pointed to the fact that the blog hosting company did not blame or even name them in the press release which explained the service outage. In any event, the action was widely reported on IT security websites, possibly damaging Blue Security's reputation within that community. At the same time, the incident and its broad reporting in more general-interest media was considered by many to be a boon to the notoriety of Blue Security and the Blue Frog project. Security expert
Brian Krebs Brian Krebs (born 1972) is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals.Perlroth, Nicole.Reporting From the Web's Underbelly. ''The New York Times''. Retrieved February 28, ...
gives a different reason for Blue Security's website being unavailable in his article for ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large nati ...
''. He says that what happened was not that Blue Security was lying about being unable to receive
HTTP The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide We ...
requests (because their servers were down), saying they had been "black hole filtered" and maliciously re-directed traffic, but rather that they were actually unable to receive traffic due to an attack on their DNS servers. This makes it probable that they had essentially been telling the truth and that CEO Eran Reshef was simply misinformed as to why their users were unable to reach their site.


Accusations of being malware

Some users accused Blue Frog of being malware itself on Mozilla's chat forums, claiming that Blue Frog spammed signatures in Yahoo! and Gmail accounts, left active remnants all over the operating system after uninstalling, and hinted that the actual reason for Blue Frog's existence in accumulating a "do-not-spam" database was to harvest fresh addresses for spammers to deluge. Blue Frog shut down one week after the forum thread appeared. After Blue Security recast itself as Collactive, it would again be accused of spamming.


Attackers identified

Soon after the attack started, Blue Security CEO Eran Reshef claimed to have identified the attacker as PharmaMaster, and quoted him as writing "Blue found the right solution to stop spam, and I can't let this continue" in an ICQ conversation with Blue Security. Prime suspects for the distributed denial of service (DDoS) attack on Blue Security's servers have been identified in the
ROKSO The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to track email spammers and Spam (electronic), spam-related activity. The name ''spamhaus'', a pseudo-German expression, ...
database as Christopher Brown, AKA Swank AKA "Dollar" and his partner Joshua Burch AKA "zMACk". Unidentified Australians and "some Russians" (Russian/Americans), notably Leo Kuvayev and Alex Blood, were also involved. The suspects were identified from a transcript of their postings in the Special ham forum where both the spam attacks and DDoS attack were planned.


Shutdown of service

Blue Security ceased operation on May 16, 2006. The company announced it will look for non-spam related uses of its technology. The company's investors expressed full support for the company's decision to change its business plan. Many users have suggested continuing the project's goals in a decentralized manner (specifically using
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
technology, with the client distributed via BitTorrent or similar, thus making both the spam processing and client distribution elements harder for the spammers to attack). One such program was purportedly begun under the name Okopipi though this now appears to have been abandoned. A number of users have recommended all users to
uninstall An uninstaller, also called a deinstaller, is a variety of utility software designed to remove other software or parts of it from a computer. It is the opposite of an installer. Uninstallers are useful primarily when software components are install ...
the Blue Frog program, as it is no longer useful without the Blue Security servers active.


Complainterator

One of the former Blue Security members, Red Dwarf, wrote a program called Complainterator.. It runs on Windows and as an add-on to several popular email clients. It processes spam emails and produces email messages to be sent to sites hosting spamvertised products. The goal is to inform hosting sites in hopes that they will remove spam sites, thereby making it difficult for spammers to profit from spam activities.


See also

*
Anti-spam techniques (e-mail) Various anti-spam techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) as opposed to ...
* Collactive, founded by the Blue Security team. * Malware


References


Bibliography

* on the spammers victory and its implications. * . * .


External links

* on
botnet A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
s and the
DDoS In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connec ...
attack on Blue Frog, Oct 31, 2006. * . * . * . * .
KnujOn
– Another anti-spam service, "a multi-tiered response to Internet threats, specifically email-based threats"
Suspects in the DDOS attack
{{Malware Malware Anti-spam 2006 software 2006 disestablishments