Saturday, June 30, 2007

Burch and Brown

The first two inhabitants placed under the glare of the spotlight in this blog have quite a history.
Joshua Burch (ebulker) and Christopher J. Brown (dollar) rate a mention in many places, more often than not in relation to the DDoS attack that put Blue Security out of business.

Spotlighting News linked them together in that sorry episode in May 2006. They even make an appearance in the Wikipedia entry on Blue Frog and the duo scored a hit in Slashdot

Obviously these good ol' boys are not new to the DDoSing game.

Friday, June 29, 2007

Swank / Dollar / Brown

Swank (Christopher J. Brown) - intro
Posted December 8th, 2006 by veruccawatcher

For the non-spammers, Swank is probably best known from Spam Kings as "Richard Cunningham".
We think he actually is a minor player among the spammers.
He likes to give the impression of being a big player.
Most of his stuff has usually gone to pieces. Mainly a middle man.
ssoft.biz is apparently his now, earlier domains are down.
Seems he is running a forum for spammers there.
Most of his older domains are either dead or not renewed.
He likes to give the impression of being good at social engineering, investigating scammers and "antis". And of course he likes bragging about what a big guy he is, how long he has been in "the industry", what he has done earlier and so on.
Now that is a bit dangerous for him. We are coming very close, almost in his backyard by following all the trails he is giving. By following those, comparing various stories, doublechecking with other sources we are getting a picture of this guy.
He claims giving his attention more to his "legitimate" businesses now. Probably some VOIP, historically he has got a hang for opps involving that kind of stuff, e.g. Cognigen and other telecommunications/internet related. He is not doing too good though, not having too much money.
According to other sources he is running 6-7 PCs from home. Not all of them in good shape, he looses stuff regularly. A couple of them seems to be below the 1GHz mark too and he tries to upgrade them (messing it up of course, his uncle was apparently not a very good teacher, or Swank has difficulties learning).

To be continued/edited .....
See the Spamhaus entry on Christopher J. Brown

What Joshua Burch sells

MastaP

Posted: Tue Jun 26, 2007 1:24 pm
Post subject: Large Dom Full Optin Data Lists.


I have Full optin Data Here is the lists I have currently
data is from 06-07 up may of this year.

These are all FULL Data Name,address,email,ip,phone, time date,source etc

File Name: aol.txt
domain: aol.com
Unique Records: 4,092,039

File Name: yahoo.txt
domain: yahoo.com
Unique Records: 14,884,106

File Name: Hotmail.txt
domain: hotmail.com
Unique Records: 3,249,110

File Name: msn.txt
domain: msn.com
Unique Records: 749,080

File Name: earthlink.txt
domain: earthlink.net
Unique Records: 505,213

Interested in any of the lists contact ICQ: 277-819-069

Aren't there a lot of customers (23 million) on AOL, Yahoo, Hotmail, MSN and Earthlink who are sitting on the edge of their seats waiting for offers from Joshua's customers, the spamming community!

Joshua Burch

This summary is not available. Please click here to view the post.

Spam-Court hit by DDOS

During the month of June, 2007, spammers have mounted several Distributed Denial of Service attacks, designed to shut down any sites that have been gathering evidence about their antics.

They set their sites on Spamhaus but with little success, because they are well protected.
They mounted an attack on Castlecops - the premier Phish combat site, but to no avail.
Next they set their sites on URIBL and caused them two or three days of grief before the attack fizzled out.
Another fizzler was SURBL - again a two day wonder before they gave up, admitting defeat.

But the one that caught everyone's imagination was the sharpest thorn in their side. This was a little site that was hitting way above its lightweight status. Spam-Court was a sleeper. A little site but with great research. A small group (maybe two to four people) spent many hours researching the spammers who congregated at a "bulker" biz forum and started creating a dossier on some of its contributers.

Whenever anyone there posted any messages about illegal operations, the Spam-Court team noted it down, did a few Google searches, and found out more about them.

And that's where the story gets really interesting. Little by little, bit by bit, they started publishing their findings, all gleaned from looking around the Internet. When the bulker biz inhabitants discovered that their cover was being blown, thet got more than just a little hot under the collar, why, they blew their stacks. This could not be! Nobody should dare to unmask their true identities! Such mischievous behaviour might lead to all sorts of unpleasnt consequences, like their arrests.

So our spammy group at bulkers called for an all out attack on spam-court, to deal to them in much the same way as many of them had previously dealt to Blue Security a year ago.
You might be wondering what it was that got them so riled up?

Over the next few days, you will be able to read the contents of Spam-Court's postings right here. Of course, Spam-Court won't stay down for long. Every day the spammers use their zombie bot-nets for DDoS attacks is a day spent not using them for spamming. And they can't countenance that for long!

About Me

Take a web site down with a DDoS and you get multiple spin-offs, and the information you tried to suppress proliferates. In fact, everyone wants to see what the fuss was about, and it becomes even more widely known. Karma. Get used to it.