Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/24/2009
03:02 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Red Condor Blocking 'Snowshoe' Spammers Without RBLs

Company developed proactive anti-spam technology

Rohnert Park, Calif. " November 23, 2009 " Among the more common types of spam today is what has been labeled as "Snowshoe" spam, which references a spamming technique of spreading spam output across many static ranges of IP addresses and domains. As the trend has continually grown over the past several months, several email security providers have started to use publicly available Real-time Blacklists (RBLs) to block the campaigns. Red Condor reported today that it is protecting its customers and blocking the spam without using the RBLs. The company detected Snowshoe spam in late 2007, and at that time, developed an IP analyzer that helps establish filtering rules far in advance of Snowshoe spam campaigns.

While most anti-spam efforts are reactionary, Red Condor's IP analyzer proactively seeks out Snowshoe spammer IP addresses. The active technology identifies spam sources by spidering out from known spammer locations to find additional sources which may have yet to send spam.

"When our email security experts recognized this emerging threat, we were able to quickly develop the technique and rules that have protected our customers ever since, some as far back as 18 months ago," said Dr. Thomas Steding, president and CEO of Red Condor. "While our customers don't need an RBL to block Snowshoe spam, the real advantage of using a Red Condor MAG network appliance or our Hosted Service, is that these rule updates are made automatically and seamlessly to our system. Most of our customers don't care about spammers' techniques, they simply want an easy-to-use solution that stops spam and eliminates false positives; two things Red Condor does very well."

Spammers that distribute spam using the Snowshoe technique use several small IP ranges from different ISPs, and use what appear to be multiple, legitimate domains. Detecting Snowshoe spam has been difficult for most anti-spam engines because the bulk email messages are often sent through each IP address in small batches and from what appear to be legitimate, uncompromised IP addresses. In addition, the spam attacks are scattered, continuing for months then stopping, and continuing at full volume at a later date. The technique not only fools the volume-based anti-spam filters, it also handicaps the reputation metrics of most anti-spam engines.

Currently, Snowshoe spam accounts for 10% of all spam that hits Red Condor's anti-spam filters.

About Red Condor

Red Condor is revolutionizing spam fighting with its next generation technology. Red Condor's highly accurate email filter, hybrid architecture Vx Technology, and fully managed appliances lead to a dramatic reduction in the cost of owning a premium spam filter. With solutions for small businesses, as well as ISPs with millions of email inboxes, Red Condor has a cost-effective, timesaving solution that is rapidly gaining market share. The system's design has built-in zero tolerance for lost email, and a near zero false positive rate while achieving long-term spam block rates greater than 99%. Red Condor Archive is a secure message archiving service with lifetime retention and unlimited storage. The company's next-generation technology is backed by a 24x7 customer care center staffed by email security experts at Red Condor's headquarters. For more information, visit www.redcondor.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...
CVE-2021-29446
PUBLISHED: 2021-04-16
jose-node-cjs-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...
CVE-2021-29451
PUBLISHED: 2021-04-16
Portofino is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. The issue will be patched in the upcoming 5.2.1 release.
CVE-2021-29452
PUBLISHED: 2021-04-16
a12n-server is an npm package which aims to provide a simple authentication system. A new HAL-Form was added to allow editing users in version 0.18.0. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this ...
CVE-2021-29444
PUBLISHED: 2021-04-16
jose-browser-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDec...