Researchers identified four distinct account-registration patterns using regular expressions on mail.ru email addresses and screenname naming conventions; these patterns flagged 975,283 spam accounts with only 4% false positives on manual validation of 150 accounts. The 25,860 accounts deployed in the attack represent just 3% of the flagged pool, indicating a centralized spam-as-a-service vendor provisioned accounts in bulk and sold access.
From 2012-thomas-adapting — Adapting Social Spam Infrastructure for Political Censorship
· §4.2
· 2012
· Large-Scale Exploits and Emergent Threats
Implications
Centralized account provisioning from spam-as-a-service markets leaves systematic registration fingerprints (correlated naming conventions, burst registration timing) — circumvention tools relying on account-based platform access should use diverse, organic-looking registration patterns to avoid bulk detection.
Holding infrastructure dormant for months before activation is a documented attacker strategy; circumvention-platform defenses should baseline account behavior over extended periods rather than only monitoring active-use windows.