Ouch. Blue Security shuts down after spammer attacks
Turns out, the mess at Blue Security, the Menlo Park anti-spam company, isn't quite over yet. The Menlo Park company is shutting down its Web site, according to this piece in the Washington Post.
You may recall when a bunch of sites like Craiglist and Six Apart were hit a couple of weeks ago, after a Russian-based spammer counter-attacked the Blue Security's anti-spam efforts. (Blue Security had tried to overwhelm the spammers with spam of its own -- but the aggressive move backfired).
Blue Security is backed by Benchmark Capital.
Using tens of thousands of hijacked computers, the spammer flooded Blue Security with so much Internet traffic that it blocked legitimate visitors from going to Bluesecurity.com, as well as to other Web sites. The spammer also sent another message: Cease operations or Blue Security customers will soon find themselves targeted with virus-filled attacks.
Today, [Blue Security's Eran] Reshef will wave a virtual white flag and surrender. The company will shut down this morning and its Web site will display a message informing its customers about the closure.
TrackBack URL for this entry:
Links to blogs that reference this entry:
A big slap in the face. Looks like a very big opportunity awaiting this space as well -- anti-spam tech "that works".
Chances are, if it's VC backed, it's crap. So it totally figures.
We're working on a P2P version of Blue Frog (we're not related to blue security in any way, we're just fans). We need volunteers who know C++, LUA and socket programming.
(Blue Security had tried to overwhelm the spammers with spam of its own -- but the aggressive move backfired).
Here is an interesting response to the presumed SPAM tactics:
.... It was a simple one-to-one relationship: for every ONE time that a BS member received a spam message, the BS software would send ONE opt-out message using that spammer‰¥ús website‰¥ús online form (this is 100% legal under CAN-SPAM).
The result is that if a spammer sent a message to 1000 BS members at once, then that spammer would quickly receive 1000 opt-out request messages. If the spammer sent 1000 spams to 1000 BS members (1 million messages), that spammer would quickly receive 1 million opt-out requests.
This is sad news.
I find it annoying that spammers seem to not care what the DoS' effects are.
Or sometimes it makes me think of how people use technology for twisted things.