John,
thanks a TON for your efforts!  I was afraid this would be hard
to catch. :(
On the bright side, the campaign has been morphing, and they are
now (IMO) much less enticing, which is a partial victory. :)


** Update:
The emails have gone thru two more significant morphs, first with
To.Realname in the URL, then with neither Realname in the URL.

The cracked sites are now sometimes using meta-refresh instead of
or in addition to a server redirect.  The scripting at the
destinations has changed.  All remain eminently straight forward
to test.

They continue to use cracked GoDaddy domains, and it's taking
over a week to catch/"fix" the ones I've checked.
I took a look at GoDaddy's abuse reporting, and, alas, 
it's javascript-only. :(

*** Does anyone know of a clean/safe means to report these,
or have a contact at GoDaddy?

For more than 10 years, I've been tracking Realnames in the
"Friends" database of my hand-classification system.
I have a (batch) regression test that I can run daily to find
these, and would be happy to send the complete URLs to GoDaddy.
Disclaimer: my feed is LOW volume, however the delivery mechanism
is continuing to morph, so at the very least my trickle should
help GoDaddy keep a (putative) detection script up to date.

Plus, it's a TON more satisfying stymying the smarter-than-skwerl
class of spammers. :]
        - "Chip"

P.S.  Some old friends let me crash with them for the duration of
the two dreaded anniversaries (9/11 & Nimda), so I was able to
get some useful work done. :)
Now I just have to get caught up on everything else!


Reply via email to