Risk

11/24/2009
03:02 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Red Condor Blocking 'Snowshoe' Spammers Without RBLs

Company developed proactive anti-spam technology

Rohnert Park, Calif. " November 23, 2009 " Among the more common types of spam today is what has been labeled as "Snowshoe" spam, which references a spamming technique of spreading spam output across many static ranges of IP addresses and domains. As the trend has continually grown over the past several months, several email security providers have started to use publicly available Real-time Blacklists (RBLs) to block the campaigns. Red Condor reported today that it is protecting its customers and blocking the spam without using the RBLs. The company detected Snowshoe spam in late 2007, and at that time, developed an IP analyzer that helps establish filtering rules far in advance of Snowshoe spam campaigns.

While most anti-spam efforts are reactionary, Red Condor's IP analyzer proactively seeks out Snowshoe spammer IP addresses. The active technology identifies spam sources by spidering out from known spammer locations to find additional sources which may have yet to send spam.

"When our email security experts recognized this emerging threat, we were able to quickly develop the technique and rules that have protected our customers ever since, some as far back as 18 months ago," said Dr. Thomas Steding, president and CEO of Red Condor. "While our customers don't need an RBL to block Snowshoe spam, the real advantage of using a Red Condor MAG network appliance or our Hosted Service, is that these rule updates are made automatically and seamlessly to our system. Most of our customers don't care about spammers' techniques, they simply want an easy-to-use solution that stops spam and eliminates false positives; two things Red Condor does very well."

Spammers that distribute spam using the Snowshoe technique use several small IP ranges from different ISPs, and use what appear to be multiple, legitimate domains. Detecting Snowshoe spam has been difficult for most anti-spam engines because the bulk email messages are often sent through each IP address in small batches and from what appear to be legitimate, uncompromised IP addresses. In addition, the spam attacks are scattered, continuing for months then stopping, and continuing at full volume at a later date. The technique not only fools the volume-based anti-spam filters, it also handicaps the reputation metrics of most anti-spam engines.

Currently, Snowshoe spam accounts for 10% of all spam that hits Red Condor's anti-spam filters.

About Red Condor

Red Condor is revolutionizing spam fighting with its next generation technology. Red Condor's highly accurate email filter, hybrid architecture Vx Technology, and fully managed appliances lead to a dramatic reduction in the cost of owning a premium spam filter. With solutions for small businesses, as well as ISPs with millions of email inboxes, Red Condor has a cost-effective, timesaving solution that is rapidly gaining market share. The system's design has built-in zero tolerance for lost email, and a near zero false positive rate while achieving long-term spam block rates greater than 99%. Red Condor Archive is a secure message archiving service with lifetime retention and unlimited storage. The company's next-generation technology is backed by a 24x7 customer care center staffed by email security experts at Red Condor's headquarters. For more information, visit www.redcondor.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20031
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2018-20032
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon t...
CVE-2018-20034
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2019-3855
PUBLISHED: 2019-03-21
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3858
PUBLISHED: 2019-03-21
An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.