Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Facebook Wins $873 Million Lawsuit Against Spammer

Spammer remains on the lam, but courts hope big award will scare others

Social networking site Facebook today won an $873 million court judgment against a spammer who has been routinely deluging the site with sales pitches and sexually explicit messages.

According to an Associated Press report, the judgment against Adam Guerbuez of Montreal is the largest ever awarded under the U.S. CAN-SPAM Act. The award is more than three times as much as Facebook will gross in revenue this year.

Facebook doesn't expect to collect the money; the report states that Guerbuez has been "difficult to find" since he was sued in August. But social networking sites are hoping that such a large judgment will deter other spammers from abusing their sites.

"Everyone who participates constructively in Facebook should feel confident that we are fighting hard to protect you against spam and other online nuisances," said Max Kelly, Facebook's director of security, on the company's blog yesterday.

The judgment isn't the first victory that the social networking sites have had against spammers. In May, MySpace won a $230 million default judgment against Sanford "Spamford" Wallace and a business partner. In June, MySpace received a $6 million settlement from Scott Richter, whose company, Media Breakaway, allegedly sent unwanted ads to users. In both cases, the spammers were also "difficult to find."

The lawyers who prosecute such cases are hopeful that the defendants will eventually be found and made to pay something against the awarded damages. But most legal experts agree that such large judgments are mainly a public relations effort designed to demonstrate that both the social networking sites and the courts are serious about doing something to stop spam.

"It's essentially letting the world know you're tough about this and creating some deterrents," said Eric Sinrod, a partner at Duane Morris in San Francisco, in an interview earlier this year.

But other legal experts say the judgments only serve to push the spammers further underground. Most spammers choose not to contest the lawsuits -- which is one reason why the judgments against them keep getting bigger -- and they can easily evade payment by simply setting up shop in another country, where they may be difficult to find and extradite to the U.S.

Still, social networking sites may have one legal weapon that hasn't been available in other CAN-SPAM lawsuits -- a contract. To participate in Facebook or MySpace, a user must agree to abide by the system's rules and practices. And if the courts can prove that a spammer has violated that contract, it may be much more difficult for spammers to wiggle out of judgments against them, the experts say.

The suit against Guerbuez accused him not only of violating laws against spam, but of breach of contract as well, which is one reason why Facebook was able to get such a huge award, the experts say. Violation of the CAN-SPAM Act alone carries a penalty of just $100 per incident -- triple that if it's done on purpose.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...