Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/3/2013
05:22 PM
Martin Lee
Martin Lee
Commentary
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Next-Gen Spam: Quality Over Quantity

The industry has been remarkably innovative in developing business models to extract money from the unwary.

The sustained drop in spam volumes since 2010 has coincided with a change in tactics. Anti-spam nonprofit Spamhaus says just 100 operations generate 80% of spam, and these specialists are moving away from indiscriminate, high-volume mailings and instead fine-tuning their campaigns. Spammers know, for instance, that users are less likely to open messages during the weekend, so they've reduced the volume of messages sent on Saturday and Sunday by 25% compared with the rest of the week. It's marketing 101 -- make messages timely and relevant to the audience, send them at the most opportune moment, improve click-through rates.

Meanwhile, spammers are counteracting anti-spam measures. Botnets can check if an individual member's IP address is blacklisted as a sender of spam and if so, assign a different task to that machine. They can spread a spam campaign across a wide range of IP addresses, so each address sends only a small number of emails, thus minimizing the chance of the spam being identified by the telltale sending of large volumes of messages from a single source.

And where once spammers had to hang around underground forums to gain access to those botnets, a shadow economy devoted to servicing the industry has sprung up. The advent of professional spammer services means that access to high-volume "bulletproof" email servers is only a search engine query away. The unique selling point of these companies is that they send email without the inconvenience of having services withdrawn over complaints about spam, and hence, serve customers for whom a takedown-resistant service is important. Such services are widely advertised, with transparent pricing plans and service levels. Spammers can even pay by credit card. These services operate without fear of legal reprisals -- and with a willingness to go on the attack.

Spammers Bite Back

In March, Spamhaus added the bulletproof hosting provider CyberBunker to its directory of suspect IP addresses; this list is widely used to block connections suspected of sending spam. Shortly after, a major distributed denial-of-service attack was launched against Spamhaus's systems. Using a list of poorly configured DNS servers, the attackers sent small DNS requests, spoofed to appear to originate from Spamhaus's IP addresses, seeking large amounts of DNS data. Think of an attacker using a small Post-it note to deliver a copy of the Yellow Pages to a victim's address. Ultimately, the attack failed, Spamhaus was able to continue its work, and two alleged perpetrators have been arrested and charged in relation to the crime. But such battles are expensive, and arrests are few and far between.

Meanwhile, spammers have become adept at hijacking breaking news as an effective method of engaging with users. In the aftermath of the Boston Marathon bombing on April 15, spammers launched two large-scale campaigns with fake news bulletins designed to prey on interest around the attack. Both sets of emails contained links to malicious websites that attempted to install malware.

cnn breaking news email

At its peak on April 17, Boston Marathon bombing-related spam comprised 40% of all spam messages delivered worldwide. This is unusual. Typically, spammers prefer to send spam in lower volumes to avoid triggering security alerts, but spammers are keen to make the most of a topic with broad interest but possibly a short lifespan.

When current news events aren't compelling enough, spammers are not beneath inventing their own news to entice users to open their messages. During the period of discussion regarding the possibility of international military action against Syria, spammers sent fake news updates announcing that bombings had already taken place. Again, these emails linked to malicious websites serving malware rather than the "full story."

obama speech email

Protecting Users

Teaching users not to click links in suspicious emails is a cornerstone of security training. However, even the most highly trained user will be tempted to open a message when faced with a convincing news report that is compelling and consistent with current events. Recipients are less likely to see emails that are relevant to their interests as suspicious, so make sure you regularly apprise employees of current spam tactics.

Still, as the spam industry professionalizes, expect deep analysis by spammers of the types of messages that users are likely to open and with which they're likely to interact. The less spam looks like spam, the more important it is to keep malicious messages from ever hitting user inboxes. When evaluating anti-spam options, look for an advanced threat intelligence network that can consider the context of a message, the reputation of the sender, the reputation of the sending IP address, and the nature of websites hosting any links within the email.

Plan for a few malicious messages being missed by anti-spam systems or accessed through other means, such as via personal webmail accounts. In these cases, the next defense is a Web scanning tool that blocks access to links that are actively being distributed in spam campaigns; even if a user has accessed a message, the device can prevent the link from being opened.

Blocking websites based on reputation is particularly useful to foil gangs that use shady hosting companies to spread malicious content, not only by email but also via social networking or other techniques. Obfuscated malware can be particularly difficult to detect using traditional signature-based antivirus techniques.

And remember that all this expensive technology is useless if the email is delivered to a junk mailbox, where someone can click on messages that look like legitimate email. If you don't have enough confidence in the false-positive rate of your anti-spam system to prevent users from having access to blocked spam email, reconsider your strategy.

One thing is for certain: Spammers aren't getting any dumber. The spam community, and the ecosystem that supports it, will continue to evolve in terms of range and professionalism. Spammers already convincingly spoof legitimate news sources; the next step must be to convincingly spoof messages from a user's employer, friends and family. Only by keeping these messages away from intended recipients can we hope to stop feeding the beast.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
10/4/2013 | 6:17:35 PM
re: Next-Gen Spam: Quality Over Quantity
I gave up checking my work spam years ago--just get too much.

I used to check my personal spam periodically because I only got a few per day and sometimes nonspam would get caught. But after my spam level went up to about 250 a day, that was no longer practical.
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
10/4/2013 | 5:56:08 PM
re: Next-Gen Spam: Quality Over Quantity
I stopped looking at my spam email. I figure, if it's important, they'll try again or ring me. I'd rather miss a message than end up calling IT In shame because my PC has ransomware (not that this has ever happened mind you ...)
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...