News

Spammer Targets Blue Frog Anti-Spam List

One spammer has managed to identify e-mail addresses on a "do-not-spam" list touted as secure, taking advantage of an obvious flaw with such lists and prompting critics to wonder what took so long.

Those who submitted their addresses to Blue Security Inc.'s Blue Frog registry have been getting messages that threaten, among other things, "nonsensical spams 20 to 40 times more than you would normally" get, according to a copy provided by the company.

Blue Security described the spammer's tactics as "bullying" and "extortion" as well as a sign the company's controversial anti-spam tactics are working, annoying spammers enough to prompt such a response.

Critics, however, say such lists are fundamentally flawed.

"Do-not-spam" registries work by encouraging users to submit their e-mail addresses -- Blue Security says it has 450,000. Before sending out a batch of messages, spammers are supposed to remove any addresses appearing on such lists.

The lists are generally encrypted so spammers can't mine them for new addresses. Instead, spammers run their lists through an identical encryption algorithm, and the resulting fingerprints are compared. Spammers can then remove any matches.

But John Levine, co-author of "Fighting Spam for Dummies," said spammers merely have to run their lists, see what's been removed and compare that with the original to find out the addresses on the "do-not-spam" lists.

"It's only a surprise that it took this long," Levine said.

Eran Reshef, Blue Security's chief executive, said spammers must already have the e-mail address to learn it is on the "do-not-spam" list.

Blue Security has been criticized for what Levine calls its vigilante approach. Users install software that sends complaints to spammers automatically. Thousands complaining at once can knock out a Web site and, the company says, encourage spammers to stop.

According the company, the spammer responded not only by threatening users if they don't stop but also by making Blue Security's Web site inaccessible outside Israel, where the company has major operations.

Featured

  • Microsoft Offers Support Extensions for Exchange 2016 and 2019

    Microsoft has introduced a paid Extended Security Update (ESU) program for on-premises Exchange Server 2016 and 2019, offering a crucial safety cushion as both versions near their Oct. 14, 2025 end-of-support date.

  • An image of planes flying around a globe

    2025 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Notebook

    Microsoft Centers AI, Security and Partner Dogfooding at MCAPS

    Microsoft's second annual MCAPS for Partners event took place Tuesday, delivering a volley of updates and directives for its partners for fiscal 2026.

  • Microsoft Layoffs: AI Is the Obvious Elephant in the Room

    As Microsoft doubles down on an $80 billion bet on AI this fiscal year, its workforce reductions are drawing scrutiny over whether AI's ascent is quietly reshaping its human capital strategy, even as official messaging avoids drawing a direct line.