The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
You are here: Home / Data Security / Spammers Get Into Google's Gmail
Is your endpoint data protected?
Spammers Get Past Security Into Google's Gmail
Spammers Get Past Security Into Google's Gmail
By Peter Piazza / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
FEBRUARY
29
2008


When you sign up for an e-mail account at Google's Gmail, you have to navigate past a CAPTCHA -- squiggly words and letters that need to be typed into a box to prove you're human and not an automated system looking to send spam. But in the war against spammers, CAPTCHAs are not holding up well and the latest attacks let spambots into Gmail.

CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart." Typically image files, the challenge-and-response system has been fairly successful in preventing spammers from opening e-mail accounts on popular Web domains like Gmail, Yahoo and Hotmail. Those accounts are prized by spammers because Web administrators can't simply blacklist the popular domains.

Spammers have found ways to break CAPTCHAs, according to Stephan Chenette, manager of Websense Security Labs. "What we're seeing is the technology on the hacker side has surpassed the simple CAPTCHAs," Chenette told us. "In the public domain there are several tools available right now for everyone to use to break simple CAPTCHAs."

Human and Computer Attacks

Chenette said organized attackers are using automated tools to sign up for Gmail and other Web-mail accounts. When the CAPTCHA image appears, it's automatically sent off to a large and low-paid workforce, typically in another country, where a worker enters the code and sends it back so the account can be created.

This type of attack has been used against other Web-mail sites, Chenette said, but in the attacks on Gmail there's a new wrinkle. "One of the more interesting things about the Gmail CAPTCHA breaking is that we believe that this might be happening through an automated process, which is the next step to breaking CAPTCHAs as opposed to hiring a large workforce to break them," he said.

In fact, Chenette believes these are two-pronged attacks. The first uses the offshore workforce, while the second may rely on bot networks, large sets of compromised computers that work together for attackers. Websense experts can see how often CAPTCHAs are being broken, and for the Gmail traffic there's only a 20 percent success rate for one prong of the attack.

"It would be very odd if a human would fail one out of five times in understanding what that CAPTCHA was," Chenette said. "From that we conclude it's possibly a bot network with automated tools involved."

Most of the IP addresses and networks involved in these attacks are from the United States, Chenette said. But when he visited some of the Web pages, the text was in Russian, leading Websense to conclude that the authors -- who specify a pay rate of $3 per broken CAPTCHA -- are likely Russian as well. That wouldn't be a surprise. "In malicious activity in general, the U.S., Russia, China and Brazil are the top offending countries," he said. (continued...)

1  |  2  |  Next Page >

Read more on: Gmail, Google, E-mail, Spam, Hackers
Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Protect 100% of your Data The prevalence of laptops and mobile devices in the enterprise makes corporate data increasingly vulnerable to loss and breach. And yet, workforce productivity is now inextricably linked to mobility. Click here to access the white paper "Top 10 Endpoint Backup Mistakes" to learn more about how to confidently protect data across platforms and devices while also providing features designed to enhance the end user experience.
MORE IN DATA SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.
 

Enterprise Hardware Spotlight
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 

Mobile Technology Spotlight
iWatch Watch: What Will Apple Ask Us To Wear?
There are still more questions than answers when it comes to details about the smart watch Apple seems poised to debut on Sept. 9. In fact, nobody seems completely sure that it will be a smart watch at all.
 
Google Successfully Tests Its Own Delivery Drone
While top technology companies are engaged in an "arms race" to develop drones that can quickly deliver goods to anyone anywhere, Google has revealed it successfully tested its own version.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.