KnujOn

Last updated

KnujOn ("no junk" spelled backwards, and pronounced "new john") was a project involved in Internet security. KnujOn targeted spam at its root, attacking the illicit activities that spammers derive their revenue from. [1] To that end, KnujOn ran an automated spam reporting tool.

Contents

History

KnujOn was founded in 2005 by Garth Bruen and his father, Dr. Robert Bruen. A multi-purpose software tool called KnujOn was presented at The Northeast Chapter of the High Technology Crime Investigation Association (HTCIA) in November 2005. That software, designed to filter junk mail and produce complaints that may result in the shutdown of scam websites, tracked Internet-based scams and built profiles of persons or organizations engaged in suspicious Internet activity by gathering and sorting large amounts of data. [2]

KnujOn.com collected spam samples from the public, not to build better filters or blacklists, but rather to use them for illicit site termination, test the Internet's policy infrastructure, and gather important statistics. Their general goal was to target advertised illicit transaction sites and hopefully take the financial incentive out of the spam cycle.

The service stopped accepting new subscriptions and email submissions on 8 March 2018, and starting from that date, email submissions began bouncing. Eventually, on 22 May 2018, the service was completely shut down.

See also

Related Research Articles

<span class="mw-page-title-main">Spamming</span> Unsolicited electronic messages, especially advertisements

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose, or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whether a sending host's IP address is blacklisted for email spam. Most mail server software can be configured to check such lists, typically rejecting or flagging messages from such sites.

Various anti-spam techniques are used to prevent email spam.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Phishing</span> Form of social engineering

Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of computer crime.

<span class="mw-page-title-main">Steve Linford</span> CEO of The Spamhaus Project

Stephen John "Steve" Linford is a British entrepreneur and anti-spam campaigner best known for founding The Spamhaus Project.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by email

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

Naive Bayes classifiers are a popular statistical technique of e-mail filtering. They typically use bag-of-words features to identify email spam, an approach commonly used in text classification.

Email fraud is intentional deception for either personal gain or to damage another individual using email as the vehicle. Almost as soon as email became widely used, it began to be used as a means to defraud people, just as telephony and paper mail were used by previous generations.

Online advertising, also known as online marketing, Internet advertising, digital advertising or web advertising, is a form of marketing and advertising that uses the Internet to promote products and services to audiences and platform users. Online advertising includes email marketing, search engine marketing (SEM), social media marketing, many types of display advertising, and mobile advertising. Advertisements are increasingly being delivered via automated software systems operating across multiple websites, media services and platforms, known as programmatic advertising.

<span class="mw-page-title-main">Blue Frog</span>

Blue Frog was a freely-licensed anti-spam tool produced by Blue Security Inc. and operated as part of a community-based system which tried to persuade spammers to remove community members' addresses from their mailing lists by automating the complaint process for each user as spam is received. Blue Security maintained these addresses in a hashed form in a Do Not Intrude Registry, and spammers could use free tools to clean their lists. The tool was discontinued in 2006.

Geobytes is a global company that provides geolocation and anti-spam software. Geobytes was incorporated in the State of Delaware, USA in 1999.

<span class="mw-page-title-main">Storm botnet</span> Computer botnet

The Storm botnet or Storm worm botnet was a remotely controlled network of "zombie" computers that had been linked by the Storm Worm, a Trojan horse spread through e-mail spam. At its height in September 2007, the Storm botnet was running on anywhere from 1 million to 50 million computer systems, and accounted for 8% of all malware on Microsoft Windows computers. It was first identified around January 2007, having been distributed by email with subjects such as "230 dead as storm batters Europe," giving it its well-known name. The botnet began to decline in late 2007, and by mid-2008 had been reduced to infecting about 85,000 computers, far less than it had infected a year earlier.

Brightmail Inc. was a San Francisco–based technology company focused on anti-spam filtering. Brightmail's system has a three-pronged approach to stopping spam, the Probe Network is a massive number of e-mail addresses established for the sole purpose of receiving spam. The Brightmail Logistics and Operations Center (BLOC) evaluates newly detected spam and issues rules for ISPs. The third approach is the Spam Wall, a filtering engine that identifies and screens out spam based on the updates from the BLOC.

The history of email spam reaches back to the mid-1990s when commercial use of the internet first became possible - and marketers and publicists began to test what was possible.

With email spam, which involves the unwanted inundation of unsolicited bulk emails, an array of user-side anti-spam techniques have been developed. These are methods created on the client arrangement of a situation, as opposed to the server-side.

SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge. SmartScreen intelligence is also used in the backend of Microsoft's online services such as the web app Outlook.com and Microsoft Bing search engine.

The online distribution of counterfeit medicines has been growing during the last decades. The role of Internet as an unregulated medicine market is the main reasons behind this phenomenon, especially the effectiveness of "spam" as a tool for advertising and promoting these products. Websites and social media are new powerful instruments that organized criminal groups could exploit to conduct their illicit businesses. The spread of this emerging threat worldwide poses a very high risk for the health and safety of unaware consumers.

Art Bowker is an American author and cybercrime specialist in corrections. His first book, The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century, describes the process of supervising cyber-offenders. Bowker, along with Todd G. Shipley, wrote a book called Investigating Internet Crimes, 1st Edition: An Introduction to Solving Crimes in Cyberspace, which provides step-by-step instructions for trying to investigate Internet crimes.

References

  1. Garth Bruen, Dr. Robert Bruen. "Project KnujOn Revised Whitepaper" (PDF). Retrieved 2008-05-23.
  2. Laurie A. Venditti (2005-11-03). "Conference Overview" (PDF). The Northeast Chapter of the High Technology Crime Investigation Association (HTCIA). Archived from the original (PDF) on 2005-12-26. Retrieved 2008-05-23.