I got this pdf via Boing Boing Blog, it is a full account and analysis of a spammer who owned a box via some PHP, Gallery and Geeklog vulnerabilities, installed some processes that tried their best to look like webservers that acted as bulk senders.
What makes this really interesting is the lengths that the spammers goes to in order to get their mail sent, custom written daemons, reporting back to the mother ship and so forth. Also interesting to read this for a view on some real world forensics performed and what looks like a good solid investigation into a compromised box.
This proves to me that the spammers have most definitely taken the fight to the next level and that those combating spam have a long way to go still before the spammers are going to admit defeat.
NOTE: This is a static archive of an old blog, no interactions like search or categories are current.