12:46 PM
Keith Ferrell
Keith Ferrell
Connect Directly

CAPTCHA Cnondrum: Automated Attacks Trump Human-Entry Defenses

Automated attacks aimed at bypassing CAPTCHA -- those squiggly characters you have to enter to access some blogs and e-mail -- are getting better and faster at overcoming anti-spam defenses. In other words, the machines are beating us at what was supposed to be our game.

Automated attacks aimed at bypassing CAPTCHA -- those squiggly characters you have to enter to access some blogs and e-mail -- are getting better and faster at overcoming anti-spam defenses. In other words, the machines are beating us at what was supposed to be our game.CAPTCHA -- Completely Automated Public Turing Test to Tell Computers and Humans Apart -- approach to granting access to humans only (theoretically only humans could read and enter the distorted characters) has run into increasing bot problems.

Bots, it turns out, and more specifically bot-makers, are pretty good at putting together coordinated attacks that decipher the CAPTCHA characters and -- presto! -- get access to the targeted service, create accounts on that service (Hotmail, for instance) and use that address to dispatch waves of spam.

The current bot approach is troubling not just for its ability to overcome CAPTCHA defenses, but also because communications between the bot and a central server are encrypted, raising the attack sophistication stakes another level. The server does the deciphering, the bot receives and then enters the deciphered characters.

CAPTCHA bypasses are nothing new, of course, nor is there a lot CAPTCHA makers can do, other than continue to refine and reinvent their defenses. (Don't know about you, but for my tastes the trend toward making CAPTCHA images more and more vague, fuzzy and distorted has gone about as far as it can go -- I've seen some that machines might be able to figure out, but that were beyond my ability to decipher and enter.)

Identity verification -- simple verification that you're a real person -- keeps hitting these walls, as recent news of a facial recognition technology hack shows.

The point of all this for small and midsize businesses -- unless you're in the CAPTCHA business -- is simple: the bad guys are smart, automated, sophisticated, but for botnets to work they must first get access to vulnerable machines. Sealing your defenses against compromise may not solve the CAPTCHA conundrum -- not sure anything can -- but it ensures that you and your company's computers won't, at lest, be part of the problem.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.