Risk
2/19/2009
12:46 PM
Keith Ferrell
Keith Ferrell
Commentary
Connect Directly
RSS
E-Mail
50%
50%

CAPTCHA Cnondrum: Automated Attacks Trump Human-Entry Defenses

Automated attacks aimed at bypassing CAPTCHA -- those squiggly characters you have to enter to access some blogs and e-mail -- are getting better and faster at overcoming anti-spam defenses. In other words, the machines are beating us at what was supposed to be our game.

Automated attacks aimed at bypassing CAPTCHA -- those squiggly characters you have to enter to access some blogs and e-mail -- are getting better and faster at overcoming anti-spam defenses. In other words, the machines are beating us at what was supposed to be our game.CAPTCHA -- Completely Automated Public Turing Test to Tell Computers and Humans Apart -- approach to granting access to humans only (theoretically only humans could read and enter the distorted characters) has run into increasing bot problems.

Bots, it turns out, and more specifically bot-makers, are pretty good at putting together coordinated attacks that decipher the CAPTCHA characters and -- presto! -- get access to the targeted service, create accounts on that service (Hotmail, for instance) and use that address to dispatch waves of spam.

The current bot approach is troubling not just for its ability to overcome CAPTCHA defenses, but also because communications between the bot and a central server are encrypted, raising the attack sophistication stakes another level. The server does the deciphering, the bot receives and then enters the deciphered characters.

CAPTCHA bypasses are nothing new, of course, nor is there a lot CAPTCHA makers can do, other than continue to refine and reinvent their defenses. (Don't know about you, but for my tastes the trend toward making CAPTCHA images more and more vague, fuzzy and distorted has gone about as far as it can go -- I've seen some that machines might be able to figure out, but that were beyond my ability to decipher and enter.)

Identity verification -- simple verification that you're a real person -- keeps hitting these walls, as recent news of a facial recognition technology hack shows.

The point of all this for small and midsize businesses -- unless you're in the CAPTCHA business -- is simple: the bad guys are smart, automated, sophisticated, but for botnets to work they must first get access to vulnerable machines. Sealing your defenses against compromise may not solve the CAPTCHA conundrum -- not sure anything can -- but it ensures that you and your company's computers won't, at lest, be part of the problem.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

CVE-2014-4511
Published: 2014-07-22
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.

CVE-2014-4911
Published: 2014-07-22
The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.