Project Honey Pot Vs John Does

  • Uploaded by: Greg Broiles
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Project Honey Pot Vs John Does as PDF for free.

More details

  • Words: 3,847
  • Pages: 13
Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 1 of 11

FILED UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA, ALEXANDRIA DIVISION

Project Honey Pot, a dba of Unspam

)

Technologies, Inc.

)

M AUS 19 P U: 2b

)

Plaintiff,

)

)

v.

)

No.

)

John Does stealing money from

)

US businesses through

)

unauthorized electronic transfers

)

made possible by computer viruses

)

transmitted in spam,

)

)

Defendants.

)

Project Honey Pot's Complaint For Violations of the Federal CAN-SPAM Act

1.

Cyber thieves are stealing millions of dollars every month from United

States business bank accounts through unauthorized electronic transfers made possible by computer viruses transmitted in spam.

2.

Like biological viruses, computer viruses come in different strains that

attack a variety of different hosts. Some of the most dangerous computer viruses in broad circulation today are attacking online banking. These strains work in a number of ways, but one key feature is their ability to obtain, through fraud and trickery, the online credentials banks rely upon to identify (i.e., authenticate) their customers during online transactions. 3.

Some versions of these viruses contain a keystroke logger function that is

capable of capturing every keyboard entry made on an infected machine. By logging keystrokes, the virus can steal a bank customer's username and password, as well as any other "credential"

Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 2 of 11

typed by a user on his or her keyboard. In addition to capturing this critical data, these online

bank viruses also use a hidden instant messenger capability to get these short-lived credentials into the hands of their criminal masters in real time.

4.

Once the cyber thief has obtained a victim's banking credentials, the real

robbery can begin. In the case of a compromised business bank account, the thief will typically exploit the bank account by logging onto the bank's website using the stolen credentials and

initiating an automated clearinghouse (or ACH) transfer drawn against the business's bank

account.1 Because many companies pay employees via ACH, these fraudulent transfers are often disguised as a direct deposit payroll to the bank account of a bogus "employee" added to the list of payroll recipients by the thief while he was fraudulently logged into the bank's website using the customer's stolen credentials. In reality, the recipient of the stolen funds is a mere "mule" whose only role is to withdraw the money as soon as it arrives in his account and then hand-carry

the cash to a nearby money transfer company storefront to move the funds outside the United States (typically to Russia or Eastern Europe). There, the John Doe defendants retrieve their stolen proceeds from yet more mules who claim the funds from the money services store in the receiving country. The mules on both sides of the transaction are paid a small percentage of the stolen proceeds.

5.

The cyber thieves stealing from US business bank accounts depend on a

vast network of compromised machines (dubbed "botnets") to provide them the data and resources they need to commit their crimes. These botnets are leased out to illegal businesses that need computer resources they cannot lawfully purchase elsewhere. Increasingly, the ^ According to the National Automated Clearing House Association (the organization that oversees its operation): "The ACH Network is a processing and delivery system that provides for the distribution and settlement of electronic credits and debits among financial institutions. The ACH Network was developed in response to the astronomical growth of check payments and the many technological advances in the mid-twentieth century and functions as an efficient, electronic alternative to paper checks." See NACHA ACH Rules, at 14 (2009).

2 of 11

Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 3 of 11

monetization of these botnets is the key reason why a vast black market Internet economy is flourishing. Spam is a key revenue source for these botnet operators, as well as a key way to grow the size of the botnet by infecting new machines as they receive spam hiding a virus. Thus, spam plays a critical role in the life cycle of a botnet and botnets are at the core of nearly every cyber threat seen today.

6.

On information and belief, the John Doe defendants are initiating

thousands of fraudulent ACH transfers every month, in an attempt to steal tens of millions of

dollars a month from US businesses. The John Does are focusing their thefts on fraudulent ACH transfers for the same reason Willie Sutton robbed banks decades ago: "That's where the money is." In 2008, NACHA reported over 18.2 billion transactions were made through ACH, in

which nearly 30 trillion dollars changed hands. See NACHA Press Release, April 6,2009.2 7.

On information and belief, despite the vast volume of money moving via

ACH, many US-based businesses have a limited understanding of the ACH Network. They do not know much about their rights and responsibilities under the laws that control ACH

transactions. Nor do they know very much about the security measures their own banks have in place, let alone the alternative security procedures that are commercially available. As a result, too many US-based businesses are unwittingly putting their money at risk by using online banking to initiate ACH transfers.

8.

If there were ever any doubt, today it is clear the key to stopping cyber

threats is to identify those responsible for it, and those who are enabling it - either knowingly or unknowingly, and getting that information into the hands of those willing and able to do something about it.

3 of 11

Case 1:09-cv-00940-GBL-TRJ

9.

Document 1

Filed 08/19/2009

Page 4 of 11

Discovering the identity of those behind today's cyber threats is not

simple, but it is not impossible either. For example, to hide successfully, spammers have to do

more than just avoid putting their name in their messages. Everything they do has to be anonymous; they have to hide while simultaneously fooling their victims (and nearly everyone

else who is providing them with some service essential to their criminal enterprise) into thinking they are running a legitimate business.

10.

The first thing a spammer needs is a long list of email addresses to spam.

Spammers get email addresses in two primary ways. They steal them (via harvesting) or they

guess them (via dictionary attacks). The most common way spammers steal email addresses is by harvesting them from websites, using web spiders. This makes life difficult for the rest of us because posting email addresses on a website is a convenient way to facilitate communications

between visitors to a website and the owners of the website. Owners of websites who want to display email addresses can obtain some protection from harvesters by installing a Project Honey

Pot on their website, and displaying this Project Honey Pot logo on their website:3

The logo serves as a warning to harvesters that all of the email addresses displayed anywhere on the website are protected by Project Honey Pot and deters harvesters by putting them at legal risk if they spam any addresses harvested from the website.

The website for the logo can be found at http://www.projecthonevpot.ore/how to avoid spambots 5.php.

4 of 11

Case 1:09-cv-00940-GBL-TRJ

11.

Document 1

Filed 08/19/2009

Page 5 of 11

Domain name owners who want to protect their email system from spam

can obtain some protection by donating an MX record to Project Honey Pot, and then publicly disclosing the fact of their donation (but they should not disclose the specific MX record donated, as spammers will simply avoid this MX record and continue to send spam to MX

records not donated to PHP). By publicly disclosing their affiliation with Project Honey Pot, PHP members warn spammers that their domain names are protected by Project Honey Pot.

Project Honey Pot a dba of Unspam Technologies. Inc.

12.

Project Honey Pot (www.projecthonevpot.org1 is a distributed network of

spam-tracking honey pots. The project allows spammers, phishers, and other e-criminals to be tracked throughout the entire "spam cycle." On information and belief, Project Honey Pot was

the first distributed e-mail harvesting research effort linking those that gather e-mail addresses by

scraping websites with those that send unsolicited and frequently fraudulent messages. More than 60,000 users from at least 165 countries actively participate in Project Honey Pot's effort to track and stop cyber crime. Project Honey Pot was created by Unspam Technologies. Inc

(www.unspam.com1 - an anti-spam company with the singular mission of helping design and enforce effective anti-spam laws. Unspam Technologies, Inc. is a Delaware corporation. 13.

Project Honey Pot receives MX record donations from the owners of

Internet domain names. Through those donations, email messages addressed to any usemame

hosted at a donated domain name are directed to email servers owned and maintained by Project Honey Pot, and those email messages are then processed by and stored on computer equipment owned and maintained by Project Honey Pot. Project Honey Pot also makes available to Internet

website owners email address honey pots that can be installed on their webpages. When a harvester visits those webpages looking for email addresses to steal, the harvester is handed a

5 of 11

Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 6 of 11

unique email address hosted within Project Honey Pot's distributed network of donated MX

records. The harvester's IP address, the date and time of the visit and other characteristics of the harvester are recorded by Project Honey Pot and maintained for analysis and tracking. When a spam message is received thereafter at the unique email address, Project Honey Pot can tie the spam message (and the spammer) to the harvester that was given that email address.

14.

Project Honey Pot is currently monitoring over 41 million honey pot email

addresses. Between January 2005 and August 2009, John Doe spammers transmitted over 825 million spam messages to hundreds of thousands of unique email addresses belonging to PHP members who have donated an MX record to, and are receiving anti-spam protection from,

Project Honey Pot. All of these email addresses were illegally harvested by the spammer (or one of his co-conspirators) from a website hosting a PHP honey pot, or were the subject of dictionary spam attacks that indiscriminately targeted random usernames hosted within Internet domain

names that have donated an MX record to, and are receiving anti-spam protection from, Project Honey Pot.

15.

Through August 2009, Project Honey Pot has identified over 57 million

unique spam server IP addresses, 72 thousand unique harvester IP addresses, 7.6 million unique dictionary attack spam server IP addresses, and from April 2007 through April 2009, has

identified 244 thousand comment spam server IP addresses. Contrary to the popular belief that most cyber criminals are beyond the reach of the United States, Project Honey Pot's data

indicates many of the John Doe Defendants in this case heavily depend on their ability to gain access to IP addresses that are located within the United States. The United States ranks #1 in

three of the four aggregate IP-address categories tracked and reported publicly by Project Honey

6 of 11

Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 7 of 11

Pot - and nearly one-third of all comment spammers launch their illegal spam from a U.S.-based IP address:

«H United States (17.8%)

#2 !■ China (13.5%) #313 Spain (11.3%) #4 HI Germany (5.1 %)

#5 LI Romania (5.0%) China (14.9%)

#2 IB United States (11.1 %) #3 SI Germany (7.1 %) #4 Z-3 Spain (5.7%) #5 LI Italy (5.7%) #1 ^ United States (11.2%) #2 HI China (9.9%) -.■'.' .'■.(s.eei.tppr25] #3 !S8 Brazil (6.4%)

Top-5 Countries For Dictionary Attacks

#4 md Russia (5.6%) I#5 md Poland (5.5%)

Top-5 Countries For

#1 ^ United States (32.5%)

Comment Spamming #2 2 India (10.0%) :.(seetop-25.)

16.

#31§3 Brazil (8.0%) #4_«Jjapan(4.7%) #5 01 China (4.6%)

Many of the spam messages Project Honey Pot receives contain online

bank viruses designed to attack online banking by stealing the credentials used by banks to authenticate their customers. For example, on information and belief, common strains of the

online banking viruses in circulation today are distributed in spam masquerading as an update to a popular email program. Victims fooled by the ruse who click on the link in the spam, however,

infect their computer and thereafter give their online banking credentials (and then their money) to the John Doe defendants. In June 2009 alone, Project Honey Pot received over 237,000 spam email messages masquerading as this bogus email update file.

17.

Every email spam message transmitted to a Project Honey Pot honey pot

harms Project Honey Pot. Each message is received by a computer server controlled by and paid 7ofll

Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 8 of 11

for by Project Honey Pot, which then must process, store and analyze the message to help protect the website owners who have installed honey pots on their webpages from harvesters and comment spammers, and to protect the domain name owners who have donated MX records from email spam attacks.

18.

By this action, Plaintiff seeks: (i) an injunction to prevent further unlawful

conduct; (ii) compensatory damages; (iii) punitive damages; (iv) attorneys' fees and costs of suit.

John Doe Defendants

19.

Defendants' identity is currently unknown to Plaintiff because Defendants

have intentionally acted to hide their identity to evade detection. They are systematically transmitting spam messages that contain computer viruses designed to steal online banking

credentials from unsuspecting computer users, and are using those credentials to steal millions of

dollars a month from US-based businesses through unauthorized electronic transfers from those businesses' bank accounts.

JURISDICTION AND VENUE

20.

This action arises out of Defendants' violation of the Federal CAN-SPAM

Act. The Court has subject matter jurisdiction of this action based on 28 U.S.C. § 1331. 21.

Pursuant to 28 U.S.C. § 1391(b), venue is proper in this judicial district.

A substantial part of the events or omissions giving rise to Plaintiffs claims, together with a substantial part of the property that is the subject of Plaintiff s claims, are situated in this judicial district. For example, as of November 2008, 832 PHP members self-report they are located in

Virginia. PHP members have installed honey pots on 349 websites that are located in Virginia, and these Virginia-based honey pots have distributed 73,794 email addresses to identified

8 of 11

Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 9 of 11

harvesters world-wide. In addition to PHP's substantial presence in Virginia, the spammers also have substantial connections to Virginia. For example, as of November 2008, the spammers have used 217 harvester IP addresses in Virginia to harvest 9,608 PHP member honey pot email addresses. The spammers have also used 77,629 spam server IPs located in Virginia to transmit 803,519 spam messages to PHP member honey pot email addresses. And on 1,232 occasions, spammers have relied entirely on Virginia IP addresses to further their illegal enterprise - by

harvesting a PHP member email address from a Virginia-based IP address and then sending spam to that address from a spam server using a Virginia-based IP address. In addition, the webpages advertised in the spam messages were all visible in Virginia.

22.

The federal District Court for the Eastern District of Virginia has personal

jurisdiction over Defendants based on the following facts: Defendants initiated emails from the Eastern District of Virginia, gained unauthorized access to computer servers located in the Eastern District, caused tortious injury in the Eastern District, and conducted business in the Eastern District of Virginia. COUNTI

Violation of the Federal CAN-SPAM Act (15 U.S.C. 8 7701 et seq.l 23.

Plaintiff repeats and re-alleges the allegations preceding this paragraph.

24.

Defendants initiated the transmission, to a protected computer, of a

commercial electronic mail message that contained, or was accompanied by, header information that was materially false or materially misleading, in violation of 15 USC § 7704(a)(l). 25.

In a pattern or practice, Defendants initiated the transmission to a

protected computer of a commercial electronic mail message that did not contain a functioning

return electronic mail address or other Internet-based mechanism, clearly and conspicuously displayed, that a recipient could use to submit, in a manner specified in the message, a reply

9ofll

Case 1:09-cv-00940-GBL-TRJ

Document 1

Filed 08/19/2009

Page 10 of 11

e.ectronic mai, message or other fom of ^.

tore commercial electronic mai, messages from .ha, sender a. the electronic mai. address where the message was received, in violation of 15 USC § 7704(a)(3).

26.

In a pattern or practice, Defendants initiated the transmission of a

commerda, eiectronic mai, message to a protected computer and fai,ed to provide: (i, clear and

conspicuous idendf.ca.ion that .he message was an advertisement or so,ici.,ion; (ii) dear and

conspicuous no.ice ma, .he recipient could dedine .o receive former commercial e,ectronic mail message, fern me sender; and (iii) a valid physica. postal address of .he sender, in vio.a.ion of 15USC§7704(a)(5).

27.

Plaintiff is an Internet access service adversely affected by .he above

viotoions, and is emitted „ an injunction barring toner violations, starry damages of S.00 for every attempted transmission of a spam message that contains false or misleading transmission information, statutory damages of $25 for every attempted transmission of a spam message tha, otherwise fails „ comply with .he Federal CAN-SPAM Ac, .reble damages

resuLing from Defendant use of email harvesters and dictionary attacks .o facile meir

vio.a,ions of the CAN-SPAM Ac,, and attorney fees and costs, as authorized by 15 USC » 7706(g).

PRAVF.R FOB PP1 Iff

WHEREFORE, Plaintiffrequests entry ofjudgment in its favor and against Defendants: 1.

Granting preliminary and permanent injunctive relief against Defendants,

and all those in privity or acting in concert with Defendants, enjoining them from directly or indirectly violating the terms of the CAN-SPAM Act; lOofll

Case 1:09-cv-00940-GBL-TRJ

2.

Document 1

Filed 08/19/2009

Page 11 of 11

Awarding Plaintiff compensatory and punitive damages in an amount to

be proven at trial;

3.

Awarding Plaintiff attorneys' fees and costs associated with prosecuting

this action; and

4.

Granting Plaintiff such other or additional relief as this Court deems just

and proper under the circumstances.

Dated: August / 6,2009

Respectfully submitted,

r

J/

INTERNET LAW GROUP Jon L. Praed (VSB #40678)

4121 Wilson Boulevard, Suite 101 Arlington, Virginia 22203 (703)243-8100

Attorneys for PlaintiffProject Honey Pot, a dba ofUnspam Technologies, Inc.

11 of 11

Case 1:09-cv-00940-GBL-TRJ 15JS44

Document 1-2

Filed 08/19/2009

Page 1 of 1

CIVIL COVER SHEET

(Rev. 12/07)

Project HoneyVot, a dba of Unspam Technologies, Inc. (b) County of Residence of First Listed Plaintiff

John Does

Unknown

County of Residence of First Listed Defendant

Park City, Utah

(IN U.S. PLAINTIFF CASES ONLY)

(EXCEPT IN US. PLAINTIFF CASES)

NOTE: IN LAND CONDEMNATION CASES. USE THE LOCATION OF THE LAND INVOLVED. Attorneys (If Known)

:, Address, and Telephone Number)

II. BASIS OF JURISDICTION

"

Plaintiff

O 4

U.S. Government

C T1ZENSHIP OF PRINCIPAL PARTIES(Place an X" in One Box for Plaintiff (For Diversity Cases Only) and One Box forDefendant)

PTF

Citizen of This Stale

S 3 Federal Question (U.S. Government Not a Party)

U.S. Govcrnmenl

O 2

III

(Place an "X" in One Box Only)

Diversity

Ol

Incorporated or Principal Place

nf

°EJ

of Business In This State

O4

O4

Citizen of Another State

O 2

O 1 Incorporated and Principal Place

S 5

3 5

Citizen or Subject of a

OJ

0

O

D 6

(Indicate Citizenship of Parties in Hem III)

Defendant

DEF

Ol

of Business In Another State

3

Foreign Nation

6

Foreign Country

IV. NATURE OF SUI PERSONAL INJURY

0 110 Insurance

310 Airplane 315 Airplane Product

O 120 Marine O 130 Miller Acl

Liability 320 Assault, Libel &

O 140 Negotiable Instrument

O 150 Recovery of Overpayment

Slander

& Enforcententof Judgment

330 Federal Employers1

O 151 Medicare Act

Liability

O 152 Recovery of Defaulted

340 Marine

Student Loans

345 Marine Product Liability 350 Motor Vehicle

(Excl. Veterans) O l53RecoveryofOverpayment

of Veteran's Benefits O 160 Stockholders' Suits

355 Motor Vehicle

Product Liability 360 Other Personal Injury

O 190 Other Contract

D 195 Contract Product Liability O 196 Franchise O

441 Voting

O 220 Foreclosure □ 230 Rent Lease & Ejectment

O

442 Employment

O

443 Housing/ Accommodations

0 a

444 Welfare 445 Amer. w/Disabilities •

D 290 All Other Real Property

362 Personal Injury • Med. Malpractice

D

365 Personal Injury Product Liability

D 630 Liquor Laws

O 640 R.R. & Truck

Injury Product Liability PERSONAL PROPERTY

□ 660 Occupational Safety/Health

O O

370 Other Fraud 371 Truth in Lending

O

380 Other Personal

O

385 Property Damage

Property Damage

Product Liability

Employment

446 Amer. w/Disabilitics ■

Habeas Corpus:

530 General 535 Dealh Penalty 540 Mandamus & Other 550 Civil Rights 555 Prison Condition

Other 440 Other Civil Rights

V. ORIGIN

O 720 Labor/Mgmt. Relations O 730 Labor/Mgmt.Reporting & Disclosure Act

O 790 Other Labor Litigation

460 Deportation

O

480 Consumer Credit

O

490 Cable/Sat TV

O

810 Selective Service

D

850 Securities/Commodities/ Exchange

O 861 HIA (1395ff) O 862 Black Lung (923) O 863 DIWC/DIWW (405(g))

875 Customer Challenge 12 USC 3410

890 Other Statutory Actions

O 864 SSID Title XVI

891 Agricultural Acts

O 865 RSI (405(g))

892 Economic Stabilization Act

O 870 Taxes (U.S. Plaintiff or Defendant)

O 791Empl. Ret. Inc.

O 871 IRS—Third Party

Security Act

450 Commerce

O

893 Environmental Matters O

894 Energy Allocation Act

D 895 Freedom of Information Act

26 USC 7609

900Appeal of Fee Determination Under Equal Access

O 462 Naturalization Applicant

to Justice 950 Constitutionality of

O 463 Habeas Corpus -

Alien Detainee O 465 Other Immigration

Sate Statutes

Actions

Reinstated or O 5 HS&SriS" ° 6 Multidistrict □ 7 {

(Place an "X" in One Box Only)

2 ssaif0"

O 690 Other

Act

O

Corrupt Organizations

□ 840 Trademark

O 710 Fair Labor Standards

410 Antitrust

O 470 Racketeer Influenced and

O 830 Patent

O 650 Airline Regs.

400 State Reapportionment O

□ 430 Banks and Banking

□ 820 Copyrights

D 740 Railway Labor Act Sentence

422 Appeal 28 USC 158

O 423 Withdrawal 28 USC 157

ofProperty21USC881

368 Asbestos Personal

O

510 Motions to Vacate

O 210 Land Condemnation

O 240 Torts to Land O 245 Tort Product Liability

O

O 610 Agriculture O 620 Other Food & Drug O 625 Drug Related Seizure

PERSONAL INJURY

°3

Cite the U.S. Civil Statute under which you are filing (Do not cite jurisdictional stalules unless diversity):

VI. CAUSE OF ACTION

Federal CAN Spa aMt nf »mail snam ^k\nn to infant

VII. REQUESTED IN

r

'terR wifh viruses

JUEVWMANDl

COMPLAINT:

VIII. RELATED CASE(S)

DOCKET NUMBER

IF ANY NATURE OF ATTORNEY OF RECORD

FORtlFFlCE USE ONLY RECEIPT»

/ AMOUNT

APPLYING IFF

JUDGE

r^

CHECK YES only if demanded mcotnp.a.m:

MAG. JUDGE

CYes

C3NO

Case 1:09-cv-00940-GBL-TRJ

Document 1-3

Filed 08/19/2009

Court Naae: United States District Court Divisions 1

Receipt Nuober: 14683887986 Cashier ID: lrobey

Transaction Date: 88/19/2069 Payer Haae: INTERNET LflU GROUP CIVIL FILING FEE

For: INTERNET LftH GROUP

- flaount:^

.

$350.00

CHECK

Senitter: INTERNET LflH GROUP Check/Honey Order Nub: 3698 flat Tendered: $350.W

Total Due: $358.66 Total Tendered: $358.80 Change fiat:

$0.80

CIIVL SUIT FILING FEE 169CV948

Page 1 of 1

Related Documents

Honey Pot
November 2019 21
Projeto Honey Pot
December 2019 7
Honey Project Work
October 2019 4
Honey
October 2019 22

More Documents from ""