Risk
7/25/2005
02:26 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Russian Spammer Murdered

Russian news site MosNews.Com reports that infamous Russian spammer Vardan Kushnir was found dead in his apartment on Sunday, having been apparently beaten to death. Kushnir reportedly headed several companies, including the Center for American English, the New York English Centre, and the Centre for Spoken English, that sent significant amounts of spam in Russia. According to

Russian news site MosNews.Com reports that infamous Russian spammer Vardan Kushnir was found dead in his apartment on Sunday, having been apparently beaten to death.

Kushnir reportedly headed several companies, including the Center for American English, the New York English Centre, and the Centre for Spoken English, that sent significant amounts of spam in Russia. According to Wikipedia.org, the "American Language Center was the most prominent and the most famous spammer in Russia around 2002-2003."Kushnir's alleged spamming reportedly brought retaliation and threats.

From the look of it, someone finally took action. Perhaps Kushnir was a victim of vigilantism. Or maybe he angered the Russian mafia.

It's tempting to say that Kushnir got what he deserved. But remember that being annoying is not a capital crime. (If he ran afoul of organized criminals, I suppose it's fair to say that crime pays until you get whacked.)

Let's hope this incident prompts everyone -- spammers and Internet users in general -- to behave better.

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
All Videos
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.
UPCOMING!
Wednesday, July 30, 1pm EDT

Hack My Ride: The State of Car (In)Security
FULL SCHEDULE | ARCHIVED SHOWS