Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Facebook Wins $873 Million Lawsuit Against Spammer

Spammer remains on the lam, but courts hope big award will scare others

Social networking site Facebook today won an $873 million court judgment against a spammer who has been routinely deluging the site with sales pitches and sexually explicit messages.

According to an Associated Press report, the judgment against Adam Guerbuez of Montreal is the largest ever awarded under the U.S. CAN-SPAM Act. The award is more than three times as much as Facebook will gross in revenue this year.

Facebook doesn't expect to collect the money; the report states that Guerbuez has been "difficult to find" since he was sued in August. But social networking sites are hoping that such a large judgment will deter other spammers from abusing their sites.

"Everyone who participates constructively in Facebook should feel confident that we are fighting hard to protect you against spam and other online nuisances," said Max Kelly, Facebook's director of security, on the company's blog yesterday.

The judgment isn't the first victory that the social networking sites have had against spammers. In May, MySpace won a $230 million default judgment against Sanford "Spamford" Wallace and a business partner. In June, MySpace received a $6 million settlement from Scott Richter, whose company, Media Breakaway, allegedly sent unwanted ads to users. In both cases, the spammers were also "difficult to find."

The lawyers who prosecute such cases are hopeful that the defendants will eventually be found and made to pay something against the awarded damages. But most legal experts agree that such large judgments are mainly a public relations effort designed to demonstrate that both the social networking sites and the courts are serious about doing something to stop spam.

"It's essentially letting the world know you're tough about this and creating some deterrents," said Eric Sinrod, a partner at Duane Morris in San Francisco, in an interview earlier this year.

But other legal experts say the judgments only serve to push the spammers further underground. Most spammers choose not to contest the lawsuits -- which is one reason why the judgments against them keep getting bigger -- and they can easily evade payment by simply setting up shop in another country, where they may be difficult to find and extradite to the U.S.

Still, social networking sites may have one legal weapon that hasn't been available in other CAN-SPAM lawsuits -- a contract. To participate in Facebook or MySpace, a user must agree to abide by the system's rules and practices. And if the courts can prove that a spammer has violated that contract, it may be much more difficult for spammers to wiggle out of judgments against them, the experts say.

The suit against Guerbuez accused him not only of violating laws against spam, but of breach of contract as well, which is one reason why Facebook was able to get such a huge award, the experts say. Violation of the CAN-SPAM Act alone carries a penalty of just $100 per incident -- triple that if it's done on purpose.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32606
PUBLISHED: 2021-05-11
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
CVE-2021-3504
PUBLISHED: 2021-05-11
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to...
CVE-2021-20309
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to ...
CVE-2021-20310
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this...
CVE-2021-20311
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from t...