Generating phish messages
First Claim
1. A method of inciting unsolicited email messages, the method comprising:
- planting a bait email address at a location on a computer network, the location being a likely target for a third party attempting to harvest email addresses, wherein the bait email address is a first bait email address;
receiving an email message addressed to the bait email address;
tracking the bait email address, along with the location at which the bait email address was planted;
correlating the received email message with the tracked bait email address and location;
analyzing with a computer system the received email message to determine whether the received email message is an unsolicited email message; and
in response to determining the received email message is an unsolicited message, indicating with the computer system that the location is a likely source for unsolicited email messages, prioritizing the location for additional planting operations, and planting at least one additional bait email address at the location on the Internet at which the first bait email address was planted.
9 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the invention provide solutions (including inter alia, systems, methods and software) for dealing with online fraud. In particular, various embodiments of the invention provide ways to incite unsolicited email messages (such as spam messages, phish messages, etc.). In accordance with some embodiments, a bait email address may be planted in a particular location on the Internet. In particular embodiments, the location of the planted email address may be tracked in order to determine which locations are relatively more likely to generate unsolicited email messages. In other embodiments, domains likely to host the bait email addresses receiving unsolicited messages may be obtained. In some cases, unsolicited messages may be analyzed and/or otherwise processed to determine whether the messages are possibly associated with a fraudulent activity. Such analysis may lead to the investigation of one or more web sites and/or to the initiation of a response against a fraudulent activity.
288 Citations
21 Claims
-
1. A method of inciting unsolicited email messages, the method comprising:
-
planting a bait email address at a location on a computer network, the location being a likely target for a third party attempting to harvest email addresses, wherein the bait email address is a first bait email address; receiving an email message addressed to the bait email address; tracking the bait email address, along with the location at which the bait email address was planted; correlating the received email message with the tracked bait email address and location; analyzing with a computer system the received email message to determine whether the received email message is an unsolicited email message; and in response to determining the received email message is an unsolicited message, indicating with the computer system that the location is a likely source for unsolicited email messages, prioritizing the location for additional planting operations, and planting at least one additional bait email address at the location on the Internet at which the first bait email address was planted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer system for inciting unsolicited email messages, the computer system comprising a processor and a computer readable medium having instructions executable by the processor to:
-
plant at least one bait email address at a location on a computer network, the location being a likely target for a third party attempting to harvest email addresses, wherein the bait email address is a first bait email address; receive an email message addressed to the bait email address; track the bait email address, along with the location at which the bait email address was planted; correlate the received email message with the tracked bait email address and location; analyze the received email message to determine whether the received email message is an unsolicited email message; and in response to determining the received email message is an unsolicited message, indicating with the computer system that the planting location is a likely source for unsolicited email messages, prioritizing the planting location for additional planting operations, and planting at least one additional bait email address at the location on the Internet at which the first bait email address was planted. - View Dependent Claims (15)
-
-
16. A computer program embodied on a computer readable storage medium, the computer program comprising instructions executable by one or more computers to:
-
plant at least one bait email address at a location on a computer network, the location being a likely target for a third party attempting to harvest email addresses, wherein the bait email address is a first bait email address; receive an email message addressed to the bait email address; track the bait email address, along with the location at which the bait email address was planted; correlate the received email message with the tracked bait email address and location; analyze the received email message to determine whether the received email message is an unsolicited email message; and in response to determining the received email message is an unsolicited message, indicating with the computer system that the planting location is a likely source for unsolicited email messages, prioritizing the planting location for additional planting operations, and planting at least one additional bait email address at the location on the Internet at which the first bait email address was planted. - View Dependent Claims (17)
-
-
18. A computer-implemented method of inciting unsolicited email messages, the method comprising:
-
planting a bait email address at a location on the Internet; correlating the bait email address with the location at which it was planted; receiving an email message addressed to the bait email address; tracking the bait email address, along with the location at which the bait email address was planted; correlating the received email message with the tracked bait email address and location; and determining, based on the received email message, that the location is likely to generate additional unsolicited email messages; prioritizing the location for additional planting operations; and planting at least one additional bail email address at the location based on said prioritizing. - View Dependent Claims (19)
-
-
20. A computer system for inciting unsolicited email messages, the computer system comprising a processor and a computer readable medium having instructions executable by the processor to:
-
plant a bait email address at a location on the Internet; correlate the bait email address with the location at which it was planted; receive an email message addressed to the bait email address; track the bait email address, along with the location at which the bait email address was planted; correlate the received email message with the tracked bait email address and location; determine, based on the received email message, that the location is likely to generate additional unsolicited email messages; prioritizing the location for additional planting operations; and planting at least one additional bait email address at the location based on said prioritizing.
-
-
21. A computer program embodied on a computer readable storage medium, the computer program comprising instructions executable by one or more computers to:
-
plant a bait email address at a location on the Internet; correlate the bait email address with the location at which it was planted; receive an email message addressed to the bait email address; track the bait email address, along with the location at which the bait email address was planted; correlate the received email message with the tracked bait email address and location; determine, based on the received email message, that the location is likely to generate additional unsolicited email messages; prioritizing the location for additional planting operations; and planting at least one additional bait email address at the location based on said prioritizing.
-
Specification