the Spamhaus Project

{{Short description|Organization targeting email spammers}}

{{primary sources|date=February 2014}}

{{Infobox organization

| name = The Spamhaus Project

| logo = Logo - The Spamhaus Project.png

| type = Nonprofit company limited by guarantee

| founded = {{start date|1998}}

| founding_location = London, England

| founder = Steve Linford

| headquarters = Andorra la Vella

| key_people =

| area_served = Worldwide

| focus = Fighting email spam and associated forms of computer crime

| method =

| revenue =

| endowment =

| num_volunteers =

| num_employees = 38 (as of March 2013){{cite web|url=https://www.spamhaus.org/organization/|title=About The Spamhaus Project|access-date=March 26, 2013|publisher=The Spamhaus Project|archive-date=December 14, 2021|archive-url=https://web.archive.org/web/20211214192203/https://www.spamhaus.org/organization/|url-status=live}}

| num_members =

| owner =

| homepage = {{url|https://www.spamhaus.org/}}

| footnotes =

}}

The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name spamhaus, a pseudo-German expression, was coined by Linford to refer to an internet service provider, or other firm, which spams or knowingly provides service to spammers.

Anti-spam lists

The Spamhaus Project is responsible for compiling several widely{{cite web| url=http://www.cbsnews.com/news/cyberattack-on-anti-spam-group-spamhaus-has-ripple-effects/| title=Cyberattack on anti-spam group Spamhaus has ripple effects| website=CBS News| date=27 March 2013| access-date=1 March 2014| archive-date=17 May 2022| archive-url=https://web.archive.org/web/20220517074207/https://www.cbsnews.com/news/cyberattack-on-anti-spam-group-spamhaus-has-ripple-effects/| url-status=live}} used anti-spam lists. Many{{cite news| url=https://www.bbc.co.uk/news/technology-22314938| title=Dutchman arrested over huge web attack| work=BBC News| date=26 April 2013| access-date=1 March 2014| archive-date=17 May 2022| archive-url=https://web.archive.org/web/20220517074208/https://www.bbc.co.uk/news/technology-22314938| url-status=live}} internet service providers and email servers use the lists to reduce the amount of spam that reaches their users. In 2006, the Spamhaus services protected 650 million email users, including the European Parliament, US Army, the White House and Microsoft, from billions of spam emails a day.

Spamhaus distributes the lists in the form of DNS-based blocklists (DNSBLs). The lists are offered as a free public service to low-volume mail server operators on the internet.{{Cite web|url=https://www.spamhaus.org/blocklists/dnsbl-fair-use-policy/|title=DNSBL Fair Use Policy|website=The Spamhaus Project|access-date=2024-04-17|archive-date=2024-04-11|archive-url=https://web.archive.org/web/20240411101610/https://www.spamhaus.org/blocklists/dnsbl-fair-use-policy/|url-status=live}} Commercial spam filtering services and other sites performing large scale usage must instead sign up for a commercial account through Spamhaus Technology its partner for distribution. Spamhaus outlines the way its DNSBL technology works in a document called "Understanding DNSBL Filtering."{{cite web |url=https://www.spamhaus.org/whitepapers/dnsbl_function/ |title=Understanding DNSBL Filtering |publisher=spamhaus.org |access-date=2019-02-12 |archive-date=2019-01-03 |archive-url=https://web.archive.org/web/20190103204940/https://www.spamhaus.org/whitepapers/dnsbl_function/ |url-status=live }}

The Spamhaus Blocklist (SBL){{cite web |url=https://www.spamhaus.org/sbl/ |title=Spamhaus Block List (SBL) |publisher=spamhaus.org |access-date=2019-02-12 |archive-date=2019-02-14 |archive-url=https://web.archive.org/web/20190214234702/https://www.spamhaus.org/sbl/ |url-status=live }} targets "verified spam sources (including spammers, spam gangs and spam support services)." Its goal is to list IP addresses belonging to, known spammers, spam operations, and spam-support services.{{cite web |first=Steve |last=Linford |author-link=Steve Linford |title=SBL Policy & Listing Criteria |publisher=The Spamhaus Project website |url=https://www.spamhaus.org/sbl/policy/ |access-date=2019-02-12 |archive-date=2019-02-19 |archive-url=https://web.archive.org/web/20190219154016/https://www.spamhaus.org/sbl/policy/ |url-status=live }} The SBL's listings are partially based on the ROKSO index of known spammers.

The Exploits Blocklist (XBL) {{cite web |url=https://www.spamhaus.org/xbl/ |title=Spamhaus Exploits Block List (XBL) |publisher=spamhaus.org |access-date=2019-02-12 |archive-date=2019-02-16 |archive-url=https://web.archive.org/web/20190216232814/https://www.spamhaus.org/xbl/ |url-status=live }} targets "illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, virus-infected PCs & servers and other types of trojan-horse exploits." That is to say it is a list of known open proxies and exploited computers being used to send spam and viruses. The XBL includes information gathered by Spamhaus as well as by other contributing DNSBL operations such as the Composite Blocking List (CBL).

The Policy Blocklist (PBL){{cite web |url=https://www.spamhaus.org/pbl/ |title=Spamhaus Policy Block List (PBL) |publisher=spamhaus.org |access-date=2019-02-12 |archive-date=2019-02-17 |archive-url=https://web.archive.org/web/20190217125716/https://www.spamhaus.org/pbl/ |url-status=live }} is similar to a Dialup Users List. It lists not only dynamic IP addresses but also static addresses that should not be sending email directly to third-party servers. Examples of such are an ISP's core routers, corporate users required by policy to send their email via company servers, and unassigned IP addresses. Much of the data is provided to Spamhaus by the organizations that control the IP address space, typically ISPs.

The Domain Blocklist (DBL){{cite web|url=https://www.spamhaus.org/dbl/|title=Spamhaus Domain Block List (DBL)|publisher=spamhaus.org|access-date=5 July 2013|archive-date=21 December 2021|archive-url=https://web.archive.org/web/20211221203312/https://www.spamhaus.org/dbl/|url-status=live}} was released in March 2010 and is a list of domain names, which is both a domain URI blocklist and RHSBL. It lists spam domains including spam payload URLs, spam sources and senders ("right-hand side"), known spammers and spam gangs, and phish, virus and malware-related sites. It later added a zone of "abused URL shorteners", a common way spammers insert links into spam emails.

The Combined Spam Sources (CSS){{cite web |url=https://www.spamhaus.org/css/ |title=Combined Spam Sources (CSS) |publisher=spamhaus.org |access-date=2022-01-06 |archive-date=2022-01-06 |archive-url=https://web.archive.org/web/20220106051719/https://www.spamhaus.org/css/|url-status=live }} is an automatically produced dataset of IP addresses that are involved in sending low-reputation email. Listings can be based on HELO greetings without an A record, generic looking rDNS or use of fake domains, which could indicate spambots or server misconfiguration. CSS is part of SBL.

The ZEN Blocklist {{cite web |url=https://www.spamhaus.org/zen/ |title=Spamhaus ZEN |publisher=spamhaus.org |access-date=2019-02-12 |archive-date=2019-02-16 |archive-url=https://web.archive.org/web/20190216235152/https://www.spamhaus.org/zen/ |url-status=live }} is a combined list, which includes all the Spamhaus IP-based DNS Blocklists.

The Botnet Controller List (BCL){{cite web|url=https://www.spamhaus.org/bcl/|title=Spamhaus Botnet Controller List (BCL)|publisher=spamhaus.org|access-date=18 June 2014|archive-date=26 August 2020|archive-url=https://web.archive.org/web/20200826014515/https://www.spamhaus.org/bcl/|url-status=live}} was released in June 2012 and is a list of IP addresses. It lists IP addresses of which Spamhaus personnel believe to be operated by cybercriminals for the exclusive purpose of hosting botnet Command&Control infrastructure. Such infrastructure is commonly used by cybercriminals to control malware infected computers.

The Spamhaus DROP ("Don't Route Or Peer") lists are JSON files delineating CIDR blocks and ASNs that have been stolen or are otherwise "totally controlled by spammers or 100% spam hosting operations".{{cite book|author1=Harold F. Tipton|author2=Micki Krause|title=Information Security Management Handbook, Sixth Edition|url=https://books.google.com/books?id=EqpjYH_Z6MQC&pg=PA56|date=17 March 2008|publisher=CRC Press|isbn=978-1-4200-6710-1|pages=56–}}{{cite web |title=Don't Route Or Peer Lists (DROP) |url=https://www.spamhaus.org/blocklists/do-not-route-or-peer/ |website=Spamhaus |access-date=29 June 2024}} As a small subset of the SBL, it does not include address ranges registered to ISPs and sublet to spammers, but only those network blocks wholly used by spammers. It is intended to be incorporated in firewalls and routing equipment to drop all network traffic to and from the listed blocks. The DROP webpage FAQ{{cite web |url=https://www.spamhaus.org/faq/section/DROP%20FAQ#339 |title=Frequently Asked Questions (FAQ) |publisher=spamhaus.org |access-date=2019-02-12 |archive-date=2019-02-13 |archive-url=https://web.archive.org/web/20190213010052/https://www.spamhaus.org/faq/section/DROP%20FAQ#339 |url-status=live }} states the data is free for all to download and use. In 2012 Spamhaus Technology offered a BGP feed of the same data.

The Spamhaus Register of known spam operations (ROKSO) is a database of spammers and spam operations who have been terminated from three or more ISPs due to spamming. It contains publicly sourced information about these persons and their domains, addresses and aliases.{{cite book|author=Robert Jones|title=Internet Forensics|url=https://books.google.com/books?id=9n3qGulfMcUC&pg=PT219|date=7 October 2005|publisher="O'Reilly Media, Inc."|isbn=978-1-4493-9056-3|pages=219–220}}

ROKSO is no longer available to the public. However, there is a special version available to law enforcement agencies, containing data on hundreds of spam gangs, with evidence, logs and information on illegal activities of these gangs.

Companies

The Spamhaus Group consists of a number of independent companies which focus on different aspects of Spamhaus anti-spam technology or provide services based around it. At the core is the Spamhaus Project SLU,{{cite web|url=https://www.spamhaus.org/faq/section/Organization|title=Spamhaus Organization FAQ|publisher=spamhaus.org|access-date=2021-06-18|archive-date=2021-04-20|archive-url=https://web.archive.org/web/20210420111426/https://www.spamhaus.org/faq/section/Organization|url-status=live}} a not-for-profit company based in Andorra which tracks spam sources and cyber threats such as phishing, malware and botnets and publishes free DNSBLs. Commercial services are managed by a British data delivery company Spamhaus Technology Ltd.,{{cite web|url=https://www.spamhaus.org/organization/strategicpartners/|title=Spamhaus Technology Ltd.|publisher=spamhaus.org|access-date=2019-02-12|archive-date=2019-02-13|archive-url=https://web.archive.org/web/20190213005830/https://www.spamhaus.org/organization/strategicpartners/|url-status=live}} based in London UK which manages data distribution services for large scale spam filter systems.

Awards

  • National Cyber Forensics Training Alliance 2008 Cyber Crime Fighter Award {{cite web |url=https://www.spamhaus.org/organization/ncftaaward/ |title=NCFTA Award |publisher=The Spamhaus Project |date=29 September 2008 |access-date=12 February 2019 |archive-date=13 February 2019 |archive-url=https://web.archive.org/web/20190213010011/https://www.spamhaus.org/organization/ncftaaward/ |url-status=live }}
  • Internet Service Providers Association's Internet Hero of 2003 Award{{cite web |url=https://www.theregister.co.uk/2004/02/20/spamhaus_crowned_internet_heroes/ |title=Spamhaus crowned Internet heroes of 2003 |publisher=The Register |date=20 February 2004 |access-date=5 July 2013 |first=Lucy |last=Sherriff |archive-date=13 July 2013 |archive-url=https://web.archive.org/web/20130713141317/http://www.theregister.co.uk/2004/02/20/spamhaus_crowned_internet_heroes/ |url-status=live }}
  • Greatest Contribution to anti-spam in the last 10 years presented to Spamhaus by Virus Bulletin Magazine.{{cite web |url=http://www.prweb.com/releases/2011/10/prweb8869576.htm |title=MXTools' Partner Spamhaus Receives Prestigious Virus Bulletin VBSpam Award |publisher=Prweb.com |access-date=2013-07-05 |archive-date=2013-07-06 |archive-url=https://web.archive.org/web/20130706073708/http://www.prweb.com/releases/2011/10/prweb8869576.htm |url-status=live }}

Conflicts

=e360 lawsuit=

In September 2006, David Linhardt, the owner-operator of American bulk-emailing company "e360 Insight LLC",{{cite news| url=https://www.theguardian.com/technology/2006/oct/19/guardianweeklytechnologysection3| title=Can an American judge take a British company offline?| newspaper=The Guardian| date=19 October 2006| access-date=1 March 2014| last1=Arthur| first1=Charles| archive-date=17 May 2022| archive-url=https://web.archive.org/web/20220517074207/https://www.theguardian.com/technology/2006/oct/19/guardianweeklytechnologysection3| url-status=live}} filed a lawsuit in Illinois USA against Spamhaus in the UK for blacklisting his bulk mailings. Spamhaus being a British organisation with no ties to Illinois or the U.S. had the case moved from the state court to the U.S. Federal District Court for the Northern District of Illinois and asked to have the case dismissed for obvious lack of jurisdiction.{{cite news |first = John |last = Leyden |author-link = John Leyden |title = Spamhaus fights US court domain threat |newspaper = The Register |date = 2006-10-10 |url = https://www.theregister.co.uk/2006/10/10/spamhaus_domain_threat/ |access-date = 2007-02-04 |archive-date = 2007-01-28 |archive-url = https://web.archive.org/web/20070128122210/http://www.theregister.co.uk/2006/10/10/spamhaus_domain_threat/ |url-status = live }}{{cite web |first=Steve |last=Linford |author-link=Steve Linford |title=TRO Answer: e360Insight vs. The Spamhaus Project |publisher=The Spamhaus Project website |url=https://www.spamhaus.org/organization/statement/003/case-answer-e360insight-vs.-the-spamhaus-project |access-date=5 July 2013 |archive-date=27 July 2013 |archive-url=https://web.archive.org/web/20130727134819/http://www.spamhaus.org/organization/statement/003/case-answer-e360insight-vs.-the-spamhaus-project |url-status=live }} The Illinois court however, presided over by Judge Charles Kocoras, ignored the request for dismissal and proceeded with the case against British-based Spamhaus without considering the jurisdiction issue, prompting British MP Derek Wyatt to call for the judge to be suspended from office.{{cite news |title=MP calls for suspension of judge in Spamhaus case |newspaper=Computeractive |date=2006-10-10 |url=http://www.computeractive.co.uk/ca/news/1917491/apig-chief-calls-suspension-spam-judge/ |access-date=2011-03-23 |archive-date=2012-03-30 |archive-url=https://web.archive.org/web/20120330032828/http://www.computeractive.co.uk/ca/news/1917491/apig-chief-calls-suspension-spam-judge |url-status=live }} Not having had its objection to jurisdiction examined, Spamhaus refused to participate in the U.S. case any further and withdrew its counsel. Judge Kocoras however, angry at Spamhaus having ‘walked out’ of his court, deemed British-based Spamhaus to have "technically accepted jurisdiction" by having initially responded at all, and awarded e360 a Default Judgement totalling US$11,715,000 in damages. Spamhaus subsequently announced that it would ignore the judgement because default judgements issued by U.S. courts without a trial "have no validity in the U.K. and cannot be enforced under the British legal system".{{cite news |first = Joris |last = Evers |title = Spam fighter hit with $11.7 million judgment |publisher = CNET News.com |date = 2006-09-14 |url = https://www.cnet.com/news/spam-fighter-hit-with-11-7-million-judgment/ |access-date = 2019-02-12 |archive-date = 2019-02-13 |archive-url = https://web.archive.org/web/20190213005905/https://www.cnet.com/news/spam-fighter-hit-with-11-7-million-judgment/ |url-status = live }}{{cite web |title=Case 1:06-cv-03958 - Document 29-1 - Filed 10/06/2006 (PDF version of Proposed Order) |publisher=The Spamhaus Project website |url=https://www.spamhaus.org/archive/legal/e360/kocoras_order_6_10.pdf |date=2006-10-06 |access-date=2019-02-12 |archive-date=2018-05-27 |archive-url=https://web.archive.org/web/20180527063447/https://www.spamhaus.org/archive/legal/e360/kocoras_order_6_10.pdf |url-status=live }}

Following the default ruling in its favour, e360 filed a motion to attempt to force ICANN to remove the domain records of Spamhaus until the default judgement had been satisfied. This raised international issues regarding ICANN's unusual position as an American organization with worldwide responsibility for domain names,{{cite web |first = Steve |last = Linford |author-link = Steve Linford |title = Responds here |publisher = The Spamhaus Project website |url = http://www.spamhaus.org/legal/answer.lasso?ref=4 }}(No longer available, but partially archived at [http://www.techweb.com/wire/security/193200666 U.S. Court Order Could Boost Spam By 50 Billion Daily] {{Webarchive|url=https://web.archive.org/web/20070927001131/http://www.techweb.com/wire/security/193200666 |date=2007-09-27 }}, [http://www.securitypronews.com/news/securitynews/spn-45-20061010SpammerCajolesICANNToBanSpamhaus.html Spammer Cajoles ICANN To Ban Spamhaus] {{Webarchive|url=https://web.archive.org/web/20061017022600/http://www.securitypronews.com/news/securitynews/spn-45-20061010SpammerCajolesICANNToBanSpamhaus.html |date=2006-10-17 }}, [http://groups.google.com/group/can.internet.highspeed/msg/d7fd46181af17980 Groups.google.com] {{Webarchive|url=https://web.archive.org/web/20080524063856/http://groups.google.com/group/can.internet.highspeed/msg/d7fd46181af17980 |date=2008-05-24 }}, highspeed and [http://groups.google.com/group/news.admin.net-abuse.email/msg/384a3cb77617a762 Groups.google.com] {{Webarchive|url=https://web.archive.org/web/20121104092053/http://groups.google.com/group/news.admin.net-abuse.email/msg/384a3cb77617a762 |date=2012-11-04 }}, abuse.email as of 2007-02-04.){{cite news |first = Doreen |last = Carvajal |title = Defending a Blurred Line: Is It Spam or Just a Company Marketing by E-Mail? |newspaper = The New York Times |date = 2006-10-16 |url = https://www.nytimes.com/2006/10/16/technology/16spam.html?ex=1318651200&en=cd20af3993bc7480&ei=5090&partner=rssuserland&emc=rss |access-date = 2007-02-04 |archive-date = 2007-03-11 |archive-url = https://web.archive.org/web/20070311041625/http://www.nytimes.com/2006/10/16/technology/16spam.html?ex=1318651200&en=cd20af3993bc7480&ei=5090&partner=rssuserland&emc=rss |url-status = live }} and ICANN protested{{cite web |title = Spamhaus Litigation Update |publisher = ICANN |date = 2006-10-10 |url = http://www.icann.org/announcements/announcement-10oct06.htm |access-date = 2007-02-04 |archive-date = 2007-01-25 |archive-url = https://web.archive.org/web/20070125035149/http://www.icann.org/announcements/announcement-10oct06.htm |url-status = live }} that they had neither the ability nor the authority to remove the domain records of Spamhaus, which is a UK-based company. On 20 October 2006, Judge Kocoras issued a ruling denying e360's motion against ICANN, stating in his opinion that "there has been no indication that ICANN [is] not [an] independent entit[y] [from Spamhaus], thus preventing a conclusion that [it] is acting in concert" with Spamhaus and that the court had no authority over ICANN in this matter. The court further ruled that removing Spamhaus's domain name registration was a remedy that was "too broad to be warranted in this case", because it would "cut off all lawful online activities of Spamhaus via its existing domain name, not just those that are in contravention" of the default judgment. Kocoras concluded, "[w]hile we will not condone or tolerate noncompliance with a valid order of this court [i.e., Spamhaus' refusal to satisfy the default judgement] neither will we impose a sanction that does not correspond to the gravity of the offending conduct".{{cite web |title = Case 1:06-cv-03958 - Document 36 - Filed 10/19/2006 (signed version of denial without prejudice of Plaintiffs' motion [26] for a rule to show cause) |publisher = ICANN |date = 2006-10-20 |url = http://www.icann.org/legal/spamhaus/denial-proposed_order-19oct06.pdf |access-date = 2007-02-04 |archive-date = 2007-01-15 |archive-url = https://web.archive.org/web/20070115221019/http://www.icann.org/legal/spamhaus/denial-proposed_order-19oct06.pdf |url-status = live }}{{cite web |title = Domain Firm, Tucows, and ICANN, Win Spamhaus Litigation |publisher = Cheaphostingdirectory.com |date = 2006-10-30 |url = http://www.cheaphostingdirectory.com/news-domain-firm-tucows-and-icann-win-spamhaus-litigation-2513.html |access-date = 2006-02-04 |archive-date = 2007-09-29 |archive-url = https://web.archive.org/web/20070929032714/http://www.cheaphostingdirectory.com/news-domain-firm-tucows-and-icann-win-spamhaus-litigation-2513.html |url-status = live }}

In 2007, Chicago law firm Jenner & Block LLP took up Spamhaus's case pro bono publico and successfully appealed the default ruling. The U.S. federal Court of Appeals for the Seventh Circuit vacated the damages award and remanded the matter back to the district court for a more extensive inquiry to determine damages.

Following the successful Appeal by Jenner & Block LLP in 2010 Judge Kocoras reduced the $11.7 million damages award to $27,002{{cite web |url=http://www.techdirt.com/articles/20100616/0137529843.shtml |title=Spammer's $11 Million Win Against Anti-Spammer Spamhaus, Reduced To $27,000 |first=Mike |last=Masnick |date=16 June 2010 |publisher=techdirt.com |access-date=23 November 2010 |archive-date=22 June 2010 |archive-url=https://web.archive.org/web/20100622002906/http://techdirt.com/articles/20100616/0137529843.shtml |url-status=live }}—$1 for tortious interference with prospective economic advantage, $1 for claims of defamation, and $27,000 for "existing contracts".{{cite web |title=Case 1:06-cv-03958 - Document 242 - Filed 06/11/10 |url= https://archive.org/download/gov.uscourts.ilnd.200330/gov.uscourts.ilnd.200330.242.0.pdf |access-date=3 April 2013}}

Both parties appealed, but e360's case for increasing the damages was sharply criticized by Judge Richard Posner of the Seventh Circuit: "I have never seen such an incompetent presentation of a damages case," Posner said. "It's not only incompetent, it's grotesque. You've got damages jumping around from $11 million to $130 million to $122 million to $33 million. In fact, the damages are probably zero."[https://arstechnica.com/tech-policy/2011/06/appeals-judges-berate-spammer-for-ridiculous-litigation/ " Appeals judges berate spammer for "ridiculous," "incompetent" litigation"] {{Webarchive|url=https://web.archive.org/web/20170227062455/https://arstechnica.com/tech-policy/2011/06/appeals-judges-berate-spammer-for-ridiculous-litigation/ |date=2017-02-27 }}, Timothy B. Lee, June 14, 2011, artechnica.com and for a second time the Court of Appeals vacated the damages award.

Finally, on 2 September 2011 the Illinois court reduced the damages award to just $3 (three dollars) total, and ordered the plaintiff e360 to pay to Spamhaus the costs of the appeal for the defence.{{cite web |url=https://www.spamhaus.org/news/article/670/ |title=Spamhaus Victory in Final Appeal in E360 Case |publisher=The Spamhaus Project |date=5 September 2009 |access-date=5 July 2013 |first=Quentin |last=Jenkins |archive-date=3 May 2014 |archive-url=https://web.archive.org/web/20140503081648/http://www.spamhaus.org/news/article/670/ |url-status=live }}

In the course of these proceedings, in January 2008 e360 Insight LLC filed for bankruptcy and closed down, citing astronomical legal bills associated with this court case as the reason for its demise.{{cite newsgroup |url=http://groups.google.com/group/news.admin.net-abuse.email/browse_frm/thread/7b4e7adf63575399/d45713f3a018df76?hl=en&ie=UTF-8&q=e360+gone+bust |title=e360 Has Gone Bust |newsgroup=news.admin.net-abuse.email |access-date=2009-05-06 |archive-date=2012-11-07 |archive-url=https://web.archive.org/web/20121107051559/http://groups.google.com/group/news.admin.net-abuse.email/browse_frm/thread/7b4e7adf63575399/d45713f3a018df76?hl=en&ie=UTF-8&q=e360+gone+bust |url-status=live |url-access=registration}}

=Spamhaus versus nic.at=

In June 2007, Spamhaus requested the national domain registry of Austria, nic.at, to suspend a number of domains, claiming they were registered anonymously by phishing gangs for illegal bank phishing purposes.{{cite web |url=https://www.spamhaus.org/organization/statement/7/ |title=Spamhaus statement on Report on the criminal 'Rock Phish' domains registered at Nic.at |publisher=spamhaus.org |access-date=2019-02-12 |archive-date=2019-02-13 |archive-url=https://web.archive.org/web/20190213010013/https://www.spamhaus.org/organization/statement/7/ |url-status=live }} The registry nic.at rejected the request and argued that they would break Austrian law by suspending domains, even though the domains were used for criminal purposes, and demanded proof that the domains were registered under false identities.{{cite web |url=http://www.heise.de/newsticker/meldung/91417 |title=Spamhaus.org setzt Österreichs Domainverwaltung unter Druck |date=19 June 2007 |publisher=heise.de |language=de |access-date=22 July 2007 |archive-date=1 July 2007 |archive-url=https://web.archive.org/web/20070701042038/http://www.heise.de/newsticker/meldung/91417 |url-status=live }} For some time the domains continued to phish holders of accounts at European banks. Finally, Spamhaus put the mail server of nic.at on their SBL spam blacklist under the SBL's policy "Knowingly Providing a Spam Support Service for Profit" for several days which caused interference of mail traffic at nic.at. All of the phishing domains in question have been since deleted or suspended by their DNS providers.{{Cite news |last=Sokolov |first=Daniel AJ |date=21 June 2007 |title=Nic.at weist Spamhaus-Darstellung zurück |trans-title=Nic.at rejects Spamhaus' statement |url=http://www.heise.de/ix/meldung/Nic-at-weist-Spamhaus-Darstellung-zurueck-142687.html |language=de |work=heise online |quote={{langx|de|text=Die DNS-Provider der Domains haben die Einträge gelöscht.|translation=The DNS providers of the domains deleted the domain entries.}} |publisher=Heinz Heise |archive-url=https://web.archive.org/web/20121023155710/http://www.heise.de/newsticker/meldung/Nic-at-weist-Spamhaus-Darstellung-zurueck-142687.html |url-status=live |archive-date=23 October 2012 |access-date=25 January 2019}}

=Blocking of Google Docs IPs=

In August 2010, Spamhaus added some Google-controlled IP addresses used by Google Docs to its SBL spam list, due to Google Docs being a large source of uncontrolled spam. Google quickly fixed the problem and Spamhaus removed the listing. Though initially wrongly reported by some press to be IPs used by Gmail, later it was clarified that only Google Docs was blocked.{{cite web|title=Spamhaus: We Blocked Google Docs Not Gmail|url=http://news.softpedia.com/news/Spamhaus-We-Blocked-Google-Docs-Not-Gmail-153093.shtml|work=Softpedia|access-date=21 August 2010|date=20 August 2010|archive-date=22 August 2010|archive-url=https://web.archive.org/web/20100822014827/http://news.softpedia.com/news/Spamhaus-We-Blocked-Google-Docs-Not-Gmail-153093.shtml|url-status=live}}

=CyberBunker dispute and DDoS attack=

File:Dns-amplification-attack open-resolver englishV73GT.png

In March 2013, CyberBunker, an internet provider named after its former headquarters in a surplus NATO bunker in the Netherlands{{cite news |title=Provocateur Comes Into View After Cyberattack |url=https://www.nytimes.com/2013/03/30/business/global/after-cyberattack-sven-olaf-kamphuis-is-at-heart-of-investigation.html |access-date=30 March 2013 |newspaper=The New York Times |date=29 March 2013 |author=Eric Pfanner |author2=Kevin J. O'Brien |archive-date=30 March 2013 |archive-url=https://web.archive.org/web/20130330025250/http://www.nytimes.com/2013/03/30/business/global/after-cyberattack-sven-olaf-kamphuis-is-at-heart-of-investigation.html |url-status=live }} that "offers anonymous hosting of anything except child porn and anything related to terrorism"{{cite web |title=Spamhaus' Blackmail War |publisher=CyberBunker |url=http://cyberbunker.com/web/spamhaus.php |access-date=23 June 2013 |archive-date=22 June 2013 |archive-url=https://web.archive.org/web/20130622151144/http://cyberbunker.com/web/spamhaus.php |url-status=live }} was added to the Spamhaus blacklist used by email providers to weed out spam.{{cite news |url=https://www.nytimes.com/2013/03/27/technology/internet/online-dispute-becomes-internet-snarling-attack.html |title=Firm Is Accused of Sending Spam, and Fight Jams Internet |last=Markoff |first=John |author2=Nicole Perlroth |date=27 March 2013 |work=The New York Times |access-date=27 March 2013 |archive-date=28 March 2013 |archive-url=https://web.archive.org/web/20130328002923/http://www.nytimes.com/2013/03/27/technology/internet/online-dispute-becomes-internet-snarling-attack.html |url-status=live }} Shortly afterwards, beginning on March 18,{{cite web |title=The DDoS That Knocked Spamhaus Offline (And How We Mitigated It) |url=http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho |publisher=CloudFlare |access-date=27 March 2013 |format=blog |date=20 March 2013 |archive-date=27 March 2013 |archive-url=https://web.archive.org/web/20130327191137/http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho |url-status=live }} Spamhaus was the target of a distributed denial of service (DDoS) attack exploiting a long-known vulnerability in the Domain Name System (DNS) which permits origination of massive quantities of messages at devices owned by others using IP address spoofing.{{cite web |title=Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing |url=http://tools.ietf.org/html/bcp38 |publisher=The Internet Engineering Task Force (IETF) |access-date=28 March 2013 |author=P. Ferguson |author2=D. Senie |date=May 2000 |archive-date=27 February 2010 |archive-url=https://web.archive.org/web/20100227093031/http://tools.ietf.org/html/bcp38 |url-status=live }}{{cite news |title=Attacks Used the Internet Against Itself to Clog Traffic |url=https://www.nytimes.com/2013/03/28/technology/attacks-on-spamhaus-used-internet-against-itself.html |access-date=28 March 2013 |newspaper=The New York Times |date=27 March 2013 |author=John Markoff |author2=Nicole Perlroth |archive-date=28 March 2013 |archive-url=https://web.archive.org/web/20130328085122/http://www.nytimes.com/2013/03/28/technology/attacks-on-spamhaus-used-internet-against-itself.html |url-status=live }} Devices exploited in the attack may be as simple as a cable converter box connected to the internet.{{cite news |title=Devices Like Cable Boxes Figured in Internet Attack |url=https://www.nytimes.com/2013/03/30/technology/devices-like-cable-boxes-figured-in-internet-attack.html |access-date=30 March 2013 |newspaper=The New York Times |date=29 March 2013 |author=Nichole Perlroth |archive-date=30 March 2013 |archive-url=https://web.archive.org/web/20130330095507/http://www.nytimes.com/2013/03/30/technology/devices-like-cable-boxes-figured-in-internet-attack.html |url-status=live }} The attack was of a previously unreported scale (peaking at 300 Gbit/s; an average large-scale attack might reach 50 Gbit/s, and the largest previous publicly reported attack was 100 Gbit/s) was launched against Spamhaus's DNS servers; {{As of|2013|3|27|lc=on}} the effects of the attack had lasted for over a week. Steve Linford, chief executive for Spamhaus, said that they had withstood the attack, using the assistance of other internet companies such as Google to absorb the excess traffic. Linford also claimed that the attack was being investigated by five different national cyber-police-forces around the world, later confirmed in news reports as being the FBI, Europol, the British National Crime Agency (NCA), the Dutch Police National High Tech Crime Unit (NHTCU), and the Spanish National Police. Spamhaus also hired Cloudflare, a DDoS mitigation company, to assist them by distributing their internet services across Cloudflare's worldwide network,{{cite web |title=The DDoS That Knocked Spamhaus Offline (And How We Mitigated It) |url=http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho |publisher=CloudFlare |access-date=March 27, 2013 |format=blog |date=March 20, 2013 |archive-date=March 27, 2013 |archive-url=https://web.archive.org/web/20130327191137/http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho |url-status=live }} after which the focus of the attack was redirected to the companies that provide Cloudflare's network connections.

Spamhaus alleged that CyberBunker, in cooperation with "criminal gangs" from Eastern Europe and Russia, was behind the attack; CyberBunker did not respond to the BBC's request for comment on the allegation;{{cite web |url=https://www.bbc.co.uk/news/technology-21954636 |publisher=BBC |title=Global internet slows after 'biggest attack in history' |date=27 March 2013 |access-date=20 June 2018 |archive-date=31 May 2018 |archive-url=https://web.archive.org/web/20180531073718/http://www.bbc.co.uk/news/technology-21954636 |url-status=live }} however, Sven Olaf Kamphuis, the owner of CyberBunker, posted to his Facebook account on 23 March "Yo anons, we could use a little help in shutting down illegal slander and blackmail censorship project 'spamhaus.org,' which thinks it can dictate its views on what should and should not be on the Internet." According to The New York Times Kamphuis also claimed to be the spokesman of the attackers, and said in a message "We are aware that this is one of the largest DDoS attacks the world had publicly seen", and that CyberBunker was retaliating against Spamhaus for "abusing their influence". The NYT added that security researcher Dan Kaminsky said "You can’t stop a DNS flood ... The only way to deal with this problem is to find the people doing it and arrest them".

The attack was attributed by network engineers to an anonymous group unhappy with Spamhaus, later identified by the victims of the attack as Stophaus, a loosely organized group of "bulletproof spam and malware hosters".{{cite news |title=Conversations with a Bulletproof Hoster, STOPhaus v Spamhaus |url=http://krebsonsecurity.com/tag/stophaus/ |access-date=24 June 2013 |newspaper=Krebs on Security |date=13 May 2013 |author=KrebsOnSecurity |archive-date=9 June 2013 |archive-url=https://web.archive.org/web/20130609072047/http://krebsonsecurity.com/tag/stophaus/ |url-status=live }}

On 26 April 2013, the owner of CyberBunker, Sven Olaf Kamphuis, was arrested in Spain for his part in the attack on Spamhaus. He was held in jail for 55 days pending extradition to the Netherlands, was released pending trial, and was ultimately found guilty and sentenced to 240 days in jail, with the remaining days suspended.{{cite news |title=Dutch Man Said to Be Held in Powerful Internet Attack |url=https://www.nytimes.com/2013/04/27/technology/dutch-man-said-to-be-arrested-in-powerful-internet-attack.html |access-date=15 May 2013 |newspaper=The New York Times |date=26 April 2013 |author=Nicole Perlroth |archive-date=27 April 2013 |archive-url=https://web.archive.org/web/20130427013233/http://www.nytimes.com/2013/04/27/technology/dutch-man-said-to-be-arrested-in-powerful-internet-attack.html |url-status=live }}{{Cite web|url=https://securityaffairs.com/53473/cyber-crime/spamhaus-attack.html|title=Hacker behind Spamhaus attack will not spend any time in the jail|first=Pierluigi|last=Paganini|date=November 16, 2016|website=Security Affairs|access-date=April 17, 2024|archive-date=April 17, 2024|archive-url=https://web.archive.org/web/20240417165843/https://securityaffairs.com/53473/cyber-crime/spamhaus-attack.html|url-status=live}}

The arrest of ‘Narko’: The British National Cyber Crime Unit revealed that a London schoolboy had been secretly arrested as part of a suspected organised crime gang responsible for the DDoS attacks.{{cite news |title=London schoolboy secretly arrested over 'world's biggest cyber attack' |url=https://www.standard.co.uk/news/crime/london-schoolboy-secretly-arrested-over-worlds-biggest-cyber-attack-8840766.html |access-date=26 September 2013 |newspaper=London Evening Standard |date=26 September 2013 |author=Martin Bentham |archive-date=26 September 2013 |archive-url=https://web.archive.org/web/20130926204015/http://www.standard.co.uk/news/crime/london-schoolboy-secretly-arrested-over-worlds-biggest-cyber-attack-8840766.html |url-status=live }} A briefing document giving details of the schoolboy's alleged involvement states: "The suspect was found with his computer systems open and logged on to various virtual systems and forums. The subject has a significant amount of money flowing through his bank account. Financial investigators are in the process of restraining monies."

=''Ames v. The Spamhaus Project Ltd''=

In 2014, Spamhaus was sued by California-based entrepreneurs Craig Ames and Rob McGee, who were involved with a bulk email marketing services business, initially through a US corporation called Blackstar Media LLC, and later as employees of Blackstar Marketing, a subsidiary of the English company Adconion Media Group Limited, which bought Blackstar Media in April 2011. Although an initial motion by Spamhaus to strike out the claims failed,{{cite web |title=Ames & anor v The Spamhaus Project Ltd & anor, Reference [2015] EWHC 127 (QB) |date=27 January 2015 |url=http://www.5rb.com/wp-content/uploads/2015/02/Ames-v-Spamhaus.pdf |publisher=5rb.com |access-date=25 October 2016 |archive-date=25 October 2016 |archive-url=https://web.archive.org/web/20161025183709/http://www.5rb.com/wp-content/uploads/2015/02/Ames-v-Spamhaus.pdf |url-status=live }} they ultimately prevailed when the claimants dropped their case and paid Spamhaus' legal costs.{{cite web |first=Steve |last=Linford |author-link=Steve Linford |title=Case Dismissed: Ames & McGee v The Spamhaus Project |date=12 June 2015 |publisher=The Spamhaus Project website |url=https://www.spamhaus.org/organization/statement/014/case-dismissed-ames-mcgee-v-the-spamhaus-project |access-date=25 October 2016 |archive-date=25 October 2016 |archive-url=https://web.archive.org/web/20161025174217/https://www.spamhaus.org/organization/statement/014/case-dismissed-ames-mcgee-v-the-spamhaus-project |url-status=live }}

See also

References

{{reflist|30em}}