Spammers, What’s in it for them?

>> Sunday, September 06, 2009


spamEvery time you open your email, the first thing that may greet you are mails from unknown people.  The subject line could have highly diverse topics, ranging from a simple “hi” to something as blatant as “erectile dysfunction.”Well, of course, getting an email from a company selling Viagra could be funny the first time you have it.  It gets a little annoying when these mails keep coming and increasing in volume.  It totally becomes frustrating when your Inbox is filled with these pesky emails that you do not know anymore which ones are valid.  For those who do not know yet, these are called SPAM mails.  The term originates in the late 1990s Monty Python’s Flying Circus comedy series.  In one of the episodes, the term spam has been repeatedly used by a group of Vikings, drowning out all conversations.  As you can see, spam mails also do the same — drown the mailbox.

Spam, whose correct terminology is a marketing mail, is a modern form of advertising and solicitation using modern electronic communications technology. It can be in the form of an unsolicited email, fax, blogs, chat room invitations and post-ups.  Spammers or those people who send this kind of mail will almost do anything to get people’s attention in order to generate traffic and sale. What they do is not very much different to what credit card and insurance companies do, which is called hard selling.  Getting a spam mail is like receiving an anonymous phone call from a fast-talking credit card company representative whose main purpose is to get you to sign up.

Spam mails are sent because they are the most inexpensive way of reaching the most number of people.  Millions of people have email addresses that the chances of a spam mail generating a sale could be quite good.  Traditional forms of advertising costs thousands to millions.  Although not as effective as traditional advertising, spam mails is proven to generate sales to a company who is engaged in this form of marketing.

Companies and even individuals profit from sending spam mails because the process is not expensive.  An individual can become famous through spam, like in the case of the person who made the “I love you” virus in 2000.  Sending spam mails could be tedious at times but the return on investments is high.  For instance, a publishing company that invests in a bulk mailing list for $500 can expect its sales to increase by 30 percent.  If its current sales revenue is $100,000, the increase could be about $30,000.

The first question that comes to mind when receiving an unsolicited mail is the sender.  Who sends these emails?  The answer is anyone.  It could be an organization, an individual, schools, and even the government.  And yes, organized crime groups could probably resort to spam mails when they find a need to do it.

How are spam mails sent?  These mails are sent by thousands in volume using computer servers specifically designed for such a purpose.  In fact, there are companies offering this kind of service to others.  Usually, an Internet Service Provider will have a cap on how many mails could be sent using its connection.  In this regard, companies engaging in bulk mail marketing would allocate one bandwidth for this purpose.  ISPs would block or cancel subscriptions of companies whose mail sending limit is repeatedly violated.

These marketing mails can be sent from anywhere.  As you know, remote access is already possible.  That means, a server in Russia, Korea, and even Afghanistan can be programmed to act as the host for thousands of marketing mails to be sent to people in the United States, Asia, and all parts of the globe connected to the Internet.  A PHP list and scripts to hide the identity or footprint of the sender are normally done to avoid detection and possible recrimination from the law.  Companies set up legitimate recipient email service addresses or website to accommodate those who would like to do business with the spam sender.

One uncommon way of sending bulk marketing mails is through the use of botnets.  These computers are hacked and controlled from the outside, turning them into a “zombie” army.  Botnets can be set up without the owners of the computers being aware of what is happening.  These zombie computers can be told to forward transmissions, like spam mails, and even farm for email addresses that are connected to the network.  This is downright unethical, of course.

How do spammers obtain email addresses?  The most common way for companies to get hold of email addresses is to buy them from the black market.  Bulk email lists are sold for a few hundred dollars, giving the company access to people who could turn out to be potential customers.  But how are these emails gathered?  The process is automated through the use of malwares.  There are software applications that can infiltrate networks and gather email addresses that are stored in every computer’s address book.  These bots can also gather addresses from websites, false website email registration campaigns, and by pressing a link from an email spam.

The kind of spam mails that are sent to users on a daily basis vary.  Some mails are about medicines that are used to correct sexual problems.  Others are about exercise programs.  There are also those who are advertising for government grants and scholarships.  Even online schools also send bulk marketing mails to advertise their institutions and their programs.  Almost all kinds of spam mails can be sent by companies who have access to the Internet and to email addresses.
How to Avoid Getting Spammed

If you are using Outlook, Eudora or Mac OS X Mail:
  1. Secure your personal firewall and patch your workstation’s OS security issues or vulnerabilities in order to prevent it from being hacked by Trojans, Viruses and Botnets.
  2. Purchase and install reliable anti-virus and anti-Spam applications to assist you in preventing and removing virus and email threats.
  3. Never respond to an unsolicited email message.
  4. Never sign up with sites that promise to remove your name from spam lists because the opposite happens.
  5. Take meaningful action to stop spammers. You can do this by acquiring a third party service like spamcop.net to help fight spam by stopping the sender dead on its tracks.

    If you are an email administrator.
  1. Secure the network’s firewall and patch server’s OS security issues or vulnerabilities in order to prevent Trojans, Viruses and Botnets from infiltrating the system.
  2. Purchase and install reliable anti-virus and anti-Spam applications to assist you in preventing and removing virus and email threats.
  3. Install Spam filters like Spamassassin or acquire an appliance like IronMail to filter, eliminate or reduce spam from entering the server.
  4. Acquire a third party service like spamcop.net to help fight spam.

blog comments powered by Disqus

Post a Comment

Related Posts with Thumbnails

  © Blogger template Webnolia by Ourblogtemplates.com 2009

Back to TOP