Wanted: E-Mail Addresses

Spammers always need fresh lists of e-mail addresses, says
Steve Santorelli of Team Cymru. Supplying them is a lucrative underground
business in its own right. The easy availability of such lists and the
commodity prices they fetch is a sign of how well developed the underground
economy really is. In this strip, a spammer negotiates for a list of one
million e-mail addresses. The final price: 100 addresses for a little more than
a penny.

Spammers always need fresh lists of e-mail addresses, says
Steve Santorelli of Team Cymru. Supplying them is a lucrative underground
business in its own right. The easy availability of such lists and the
commodity prices they fetch is a sign of how well developed the underground
economy really is. In this strip, a spammer negotiates for a list of one
million e-mail addresses. The final price: 100 addresses for a little more than
a penny.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.