12:46 PM
Keith Ferrell
Keith Ferrell

CAPTCHA Cnondrum: Automated Attacks Trump Human-Entry Defenses

Automated attacks aimed at bypassing CAPTCHA -- those squiggly characters you have to enter to access some blogs and e-mail -- are getting better and faster at overcoming anti-spam defenses. In other words, the machines are beating us at what was supposed to be our game.

Automated attacks aimed at bypassing CAPTCHA -- those squiggly characters you have to enter to access some blogs and e-mail -- are getting better and faster at overcoming anti-spam defenses. In other words, the machines are beating us at what was supposed to be our game.CAPTCHA -- Completely Automated Public Turing Test to Tell Computers and Humans Apart -- approach to granting access to humans only (theoretically only humans could read and enter the distorted characters) has run into increasing bot problems.

Bots, it turns out, and more specifically bot-makers, are pretty good at putting together coordinated attacks that decipher the CAPTCHA characters and -- presto! -- get access to the targeted service, create accounts on that service (Hotmail, for instance) and use that address to dispatch waves of spam.

The current bot approach is troubling not just for its ability to overcome CAPTCHA defenses, but also because communications between the bot and a central server are encrypted, raising the attack sophistication stakes another level. The server does the deciphering, the bot receives and then enters the deciphered characters.

CAPTCHA bypasses are nothing new, of course, nor is there a lot CAPTCHA makers can do, other than continue to refine and reinvent their defenses. (Don't know about you, but for my tastes the trend toward making CAPTCHA images more and more vague, fuzzy and distorted has gone about as far as it can go -- I've seen some that machines might be able to figure out, but that were beyond my ability to decipher and enter.)

Identity verification -- simple verification that you're a real person -- keeps hitting these walls, as recent news of a facial recognition technology hack shows.

The point of all this for small and midsize businesses -- unless you're in the CAPTCHA business -- is simple: the bad guys are smart, automated, sophisticated, but for botnets to work they must first get access to vulnerable machines. Sealing your defenses against compromise may not solve the CAPTCHA conundrum -- not sure anything can -- but it ensures that you and your company's computers won't, at lest, be part of the problem.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Why else would HR ask me if I have a handicap?"
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.