ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

The man who, between 2008 and 2009, stole the log-in credentials of Facebook users to spread his credential-stealing web links, has been sentenced to some hard time.

Sanford Wallace, a habitual spammer with a long history of spreading the irritating garbage to unwilling recipients, will be spending two and a half years in prison in addition to paying a fine of $310,629.

Wallace’s modus operandi involved sending his victims a link to an external site that would steal both their credentials to log in as well as their compiled friend lists. To do so, he utilized the aliases of David and Laura Frederix and 1,500 falsified domains. Once he claimed their data, his message could be sent to members of the friend list from the victims’ accounts, creating a system that expanded exponentially as more and more fell prey to the spammer’s trap. This trap, by the way, turned Wallace a profit; he was able to send links to other websites and was then paid for generating traffic to them.

This system resulted in a total of 27 million spam messages being dispersed to over 550,000 Facebook users.

While this was Wallace’s first conviction, it was not his first spam-related offense. His experience with the widely-reviled junk mail reaches back to 1995 when he established his company Cyber Promotions as part of a junk fax campaign. He also had lost multiple civil cases from bigwigs such as Facebook, the FTC, and others. Wallace was held in contempt after he failed to abide by three court orders issued in 2009, barring him from ever again visiting Facebook.

Upon his release, Wallace faces an additional five years of probation, along with court-ordered mental health treatment. And, almost certainly for the best, Wallace has been barred from owning or using a computer without the express permission of his probation officer, although only time will tell if that ultimately makes a difference.

Lessons From the Spam King
Hackers and malware distributors can be frustratingly persistent in their attempts to cause grief. As a result, you need to stay just as persistent in your defense and vigilance against these threats. Here are a few tips on how to do just that:

  • Condense your friend list: While Facebook and other social networks can be great tools for remaining in contact with people you know, there probably isn’t much need to stay friends with the guy you shared a class or two with in college and never really spoke to. If it isn’t someone you will likely need to keep in touch with in the future, there isn’t much reason to add another point of vulnerability to your account. After all, one more friend is one more possible victim of an attack like Wallace’s.
  • Keep your private details private: Despite the option to fill in numerous personal details as a part of your account, it is strongly recommended that you refrain from doing so as much as possible. Otherwise, you are handing out the details needed for crimes like identity theft or spamming. If nothing else, at least be certain that these details are set to private viewing only and check back periodically in case an update to the website has reset your selections.
  • Avoid strange or unusual links: Keep an eye out for a few warning signs of social network malware. Is the message coming out of the blue from a contact that, besides this sudden message, you had more or less fallen out of touch with? Is the message misspelled, with odd grammar mistakes that are out of character for the alleged sender? Is the “personal” message vaguely worded, making it applicable to any reader but still tempting to click on? Chances are it is not actually from the supposed sender, and clicking the link will only serve to allow your account to be jeopardized as well.

Nobody likes being spammed, so it’s everyone’s duty to avoid helping spammers like Sanford Wallace in their attempts to do just that. For more tips on this and other IT matters, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Smartphones Microsoft Office Upgrade Small Business Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps Windows 10 Managed Service IT Support Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Networking Windows Artificial Intelligence Managed IT services Workplace Strategy Bandwidth Information Mobile Device Management Encryption App Business Technology Virtualization Remote Blockchain Spam WiFi Server History Apple Gmail Information Technology Office Two-factor Authentication Employee/Employer Relationship Office 365 Budget Cybercrime BDR Health Big Data Analytics Access Control Wi-Fi Conferencing Data Security Voice over Internet Protocol Patch Management Compliance Remote Monitoring Vendor Employer-Employee Relationship Cost Management Help Desk IT Management Hacking Document Management Remote Computing Training Save Money Hacker Firewall BYOD Mobile Office Computing Search... Augmented Reality Managed Services Word Applications Best Practice Project Management Vendor Management Hard Drive IBM Retail Website Vulnerabilities Alert Legal Hiring/Firing Outlook Password Data storage Data loss Money Customer Service Unified Threat Management Remote Workers Robot Marketing Paperless Office Antivirus Windows 7 Data Breach Running Cable Free Resource iPhone Maintenance Education Cortana Storage Content Filtering How To Twitter Websites Router Monitoring Mobility Meetings Law Enforcement Healthcare The Internet of Things End of Support YouTube Printer User Google Maps Scam Laptop Chrome VPN Travel Virtual Reality Social Engineering Update Cryptocurrency Windows 11 Black Market Cleaning Mobile Computing Social Sports SaaS DDoS Politics IT Consultant Settings Machine Learning Managed Services Provider Disaster Customer Relationship Management Virtual Private Network Co-Managed IT Physical Security Solid State Drive Entertainment Processor Current Events Lithium-ion battery Chromebook Drones Solutions Start Menu Computer Care Automobile Downloads Processors Integration Multi-factor Authentication Images 101 Vulnerability Display How To Microchip Software as a Service Data Protection Flexibility HIPAA Saving Time Employees Avoiding Downtime Bitcoin Identity Theft Computers Hack Notifications Wireless Technology Holidays Unified Communications eWaste Telephone Google Docs Cooperation Video Conferencing Tech Terms Downtime Bluetooth Distributed Denial of Service Excel Safety Managed IT Office Tips Virtual Machines Memory Computer Repair PowerPoint Digital Private Cloud Virtual Desktop Administration Professional Services Experience Presentation Taxes Virtual Assistant Specifications Content Desktop Staffing Memes Phone System Net Neutrality Spyware IP Address Electronic Medical Records Accountants Human Resources Audit Workplace Banking Financial Data Google Wallet File Sharing Database Messenger Risk Management Redundancy Deep Learning IT Cache Health IT Equifax Google Apps Hard Drive Disposal Scams Business Metrics Telework Unified Threat Management Hosted Solution Computer Accessories Workers Tactics Microsoft 365 Username Books Smartwatch Recovery Communitications Competition Language Procurement Society CCTV Startup Printing Freedom of Information email scam Cables LiFi FinTech Touchscreen Entrepreneur Navigation Addiction Application Visible Light Communication Computer Malfunction Mobile Security Reading CES Emergency Documents Monitors IT Assessment Supply Chain Management Vendor Mangement Windows 8 Value Business Intelligence User Tip Legislation News Network Management Point of Sale Organization Cyber security Samsung Evernote Advertising Webcam Relocation Securty Displays Smart Devices Uninterrupted Power Supply Fake News Shortcuts Work/Life Balance Remote Working Troubleshooting Business Mangement Domains Tech Support Proxy Server Emails Service Level Agreement Computing Infrastructure AI Trend Micro Tablets Transportation Management Device security Digital Security Cameras Electronic Health Records Google Calendar Microsoft Excel Be Proactive Wasting Time Supercomputer Wireless Headphones In Internet of Things Going Green Business Cards Hacks Virus Network Congestion eCommerce Tech Modem Public Speaking Motion Sickness Error Reliable Computing Videos Writing Surveillance Comparison Workplace Strategies Streaming Media Business Owner Google Drive Managing Costs Bookmark Download Piracy Keyboard Term SSID Corporate Profile Hard Drives Employer/Employee Relationships HTML Scalability Media Knowledge Development Television Text Messaging Telephony Proactive IT Virtual Machine Employer Employee Relationship intranet Browsers Nanotechnology Administrator Upload Software License Bring Your Own Device Reviews Wireless Optimization Cabling Shortcut Google Play Tablet Heating/Cooling Teamwork G Suite Environment Social Network 2FA Mouse Smart Technology Windows XP Data Storage Inbound Marketing VoIP Music Hypervisor Tracking Social Networking Data Analysis Screen Reader Medical IT Trends Mobile Technology Shopping Security Cameras SQL Server Web Server Customer Resource management Devices Paperless Botnet SharePoint Tip of the week PCI DSS Licensing Digital Payment Fileless Malware Gamification Company Culture Rental Service Gig Economy Electronic Payment Micrsooft Humor Worker Flash Internet Service Provider Access Azure Telephone System Regulations Business Communications Supply Chain Telephone Systems Regulations Compliance Time Management Business Growth Managed IT Service Public Cloud Directions Backup and Disaster Recovery

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?