Uh-oh: Spam's getting more sophisticated
Computerworld - Just as security experts match wits with hackers, those trying to block unwanted e-mail face increasingly elaborate "attacks" from spammers trying to slip messages through antispam defenses.
"These guys' technical ability should be respected," John Graham-Cumming, author of open-source spam filtering software POPFile, told a conference at MIT today.
Graham-Cumming outlined several ways spam authors try to evade blocking software, ranging from the simple to the sophisticated. Some messages just alter words to foil basic efforts to spot red-flag words; for example, most recipients know what "Vi*gra," V1agra" or "V i a g r a" mean, but basic word-blocking software might not. Other efforts involving HTML-coded messages instead of plain text are far more clever.
"The most dastardly thing I've seen so far," Graham-Cumming said, involved words that were printed vertically within the raw HTML text,
. The HTML message then used tables to reassemble the words and display them horizontally again. The result: Antispam filters didn't understand that the words in vertical format were spam, and let the message through; but the HTML displayed normally to recipients. "This is ingenious," he said. The lesson for those writing antispam software: Filters need to understand how HTML is displayed to the end user, not merely look at the raw text.
Other filter-evading techniques include:
- Using a two-part Multipurpose Internet Mail Extensions (MIME) encoded message, with the plain-text portion looking like legitimate mail, which the filter reads and lets through, but the HTML portion shown to the recipient containing that message about making millions working at home or enlarging various parts of one's anatomy. Lesson: Filters should check whether text and HTML portions of two-part MIME messages are the same.
- Employing "invisible ink" within an HTML message -- white text on a white background, for example, containing words that look like a legitimate message but the user doesn't see; then there's just a short spam message actually visible to the user. Lesson: If the user can't see it, neither should a spam filter.
- Sending an HTML message with no words for a filter to check, just an image with the spam's message. Lesson: Filters need to look at more than text.
Today's conference was aimed at bringing spam-fighters together to talk about research, products and organized efforts such as the SpamArchive, which aims to collect a large database of spam messages that researchers anddevelopers of spam-blocking tools can use to test various antispam approaches.
John Draper at ShopIP got some chuckles when he shared his "cool things you can do" to spammers, such as flood their return mail or set up numerous inactive "honey pot" e-mail addresses to "poison" their mailing lists.
Often spammers don't contain legitimate return addresses, but Draper said he went to one spammer's site, found a product order form, duplicated it on his own system and then set it up to send about a thousand messages back to the spammer.
The apparently irony-challenged spammer contacted Draper promptly to complain. Draper responded that he would stop if his e-mail was removed from the spam list. It was taken off the next day.
Read more about Networking in Computerworld's Networking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Desktop Apps White Papers | Webcasts