Spam originates from diverse sources, often used in conjunction to mask sender identity and evade filters. Core sources include botnets, compromised accounts, and exploited servers. Techniques like dynamic IPs and bulletproof hosting aid in evasion. Some Cloud providers like Amazon SES, Gmail, and Outlook struggle with policing spam, especially in B2B environments, partly due to ineffective compliance and lacking incentives for removal. Open relays, rented lists, smaller ESPs with weak security, and purchasing old domains are also used. The rise of stricter filters and decreased false positive tolerance also shape the landscape.
11 marketer opinions
Spam originates from a variety of sources and platforms, often used in combination to obfuscate the sender's identity and bypass spam filters. Common sources include: botnets (networks of infected computers), compromised email accounts, rented servers, smaller email marketing services with lax policies, open mail relays, bulletproof hosting services, web hosting providers that ignore spam complaints, SMTP servers on residential ISPs, and purchased old domains. Some ESPs may be exploited due to poor monitoring, and some providers turn a blind eye to spam due to the profit generated. Spammers also utilize techniques to mask their locations, such as using public Wi-Fi networks, VPNs, and proxies. Amazon SES, Gmail, and Outlook have been mentioned as platforms used to send spam.
Marketer view
Email marketer from Quora explains that spammers often use a combination of techniques including compromised email accounts, open relays and bulletproof hosting, making attribution difficult. They also note that some legitimate ESPs may be exploited due to poor monitoring.
14 Jul 2022 - Quora
Marketer view
Email marketer from Reddit shares that spam is sent from botnets, compromised accounts, and some smaller email marketing platforms with weaker security. Spammers also use public Wi-Fi networks to mask their locations.
27 Feb 2022 - Reddit
6 expert opinions
Spam originates from various sources, including botnets, compromised servers, hijacked email accounts, and bulletproof hosting providers. Cloud providers struggle with policing spam, particularly in B2B environments, due to ineffective compliance teams and a lack of incentive to remove bad actors. Gmail and Microsoft are identified as significant sources of B2B spam. Filters are becoming stricter and less forgiving of false positives, leading to a less marketer-friendly environment.
Expert view
Expert from Email Geeks explains that all the cloud providers are pretty messy and it’s very, very hard to police sending particularly in a B2B environment. So many ESPs built their compliance teams based on things like GPT and FBLs and … they simply don’t work in a B2B environment.
8 Apr 2024 - Email Geeks
Expert view
Expert from Email Geeks shares that compliance is going to get worse before it gets better and it’s going to take some innovative thinking and resource investment to actually have the ESPs stopping spam more effectively. She adds that she is not sure they have any real incentive to do so because filters are more selective and a bad customer only hurts themselves. There’s just not the incentive to throw off bad customers that there used to be and compliance desks are expensive. They think we’re going to see spam get worse and more and more ESPs just not having the ability to deal with it.
24 Apr 2024 - Email Geeks
5 technical articles
Spam is predominantly sent through botnets (networks of compromised computers), compromised email accounts, and exploited servers. These platforms allow spammers to send large volumes of unsolicited emails while masking their true identities. Dynamic IP addresses, open proxies and bulletproof hosting are also used to evade detection. Network security and email authentication protocols like SPF, DKIM, and DMARC are crucial in mitigating spam attacks.
Technical article
Documentation from Cisco identifies that botnets, hijacked accounts, and compromised servers are frequently used by spammers. Cisco outlines the importance of network security and email authentication to mitigate spam attacks.
6 May 2023 - Cisco
Technical article
Documentation from Cloudflare describes that malicious actors leverage botnets, compromised email accounts and unsecure servers to send spam. They highlight the use of email authentication protocols like SPF, DKIM and DMARC as effective tools in identifying spam.
10 Dec 2021 - Cloudflare
How are spammers getting content for their spam emails?
How can ESPs identify and block spammers before they damage IP reputation?
How can I identify the ESP used to send a spam email using the email headers?
How can I stop a relentless spammer who switches domains and sends via Google Workspace?
How can you identify spammers?