HOME     MENU     SEARCH     NEWSLETTER    
THE ENTERPRISE SECURITY SUPERSITE. UPDATED 11 MINUTES AGO.
You are here: Home / Network Security / Spammers Get Into Google's Gmail
Powered by Verisign:
Cloud-based solution to improve Your DDoS Attack Readiness.
Click here to learn more.
Spammers Get Past Security Into Google's Gmail
Spammers Get Past Security Into Google's Gmail
By Peter Piazza / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
FEBRUARY
29
2008


When you sign up for an e-mail account at Google's Gmail, you have to navigate past a CAPTCHA -- squiggly words and letters that need to be typed into a box to prove you're human and not an automated system looking to send spam. But in the war against spammers, CAPTCHAs are not holding up well and the latest attacks let spambots into Gmail.

CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart." Typically image files, the challenge-and-response system has been fairly successful in preventing spammers from opening e-mail accounts on popular Web domains like Gmail, Yahoo and Hotmail. Those accounts are prized by spammers because Web administrators can't simply blacklist the popular domains.

Spammers have found ways to break CAPTCHAs, according to Stephan Chenette, manager of Websense Security Labs. "What we're seeing is the technology on the hacker side has surpassed the simple CAPTCHAs," Chenette told us. "In the public domain there are several tools available right now for everyone to use to break simple CAPTCHAs."

Human and Computer Attacks

Chenette said organized attackers are using automated tools to sign up for Gmail and other Web-mail accounts. When the CAPTCHA image appears, it's automatically sent off to a large and low-paid workforce, typically in another country, where a worker enters the code and sends it back so the account can be created.

This type of attack has been used against other Web-mail sites, Chenette said, but in the attacks on Gmail there's a new wrinkle. "One of the more interesting things about the Gmail CAPTCHA breaking is that we believe that this might be happening through an automated process, which is the next step to breaking CAPTCHAs as opposed to hiring a large workforce to break them," he said.

In fact, Chenette believes these are two-pronged attacks. The first uses the offshore workforce, while the second may rely on bot networks, large sets of compromised computers that work together for attackers. Websense experts can see how often CAPTCHAs are being broken, and for the Gmail traffic there's only a 20 percent success rate for one prong of the attack.

"It would be very odd if a human would fail one out of five times in understanding what that CAPTCHA was," Chenette said. "From that we conclude it's possibly a bot network with automated tools involved."

Most of the IP addresses and networks involved in these attacks are from the United States, Chenette said. But when he visited some of the Web pages, the text was in Russian, leading Websense to conclude that the authors -- who specify a pay rate of $3 per broken CAPTCHA -- are likely Russian as well. That wouldn't be a surprise. "In malicious activity in general, the U.S., Russia, China and Brazil are the top offending countries," he said. (continued...)

1  2  Next Page >

Read more on: Gmail, Google, E-mail, Spam, Hackers
Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
DDoS PROTECTION POWERED BY VERISIGN: The increasing frequency, size and sophistication of DDoS attacks are rapidly changing the face of network security. DDoS Protection Services powered by Verisign provides a comprehensive cloud-based solution from the operator of some of the Internet's largest and most reliable infrastructure. Click here to take a closer look Verisign's DDoS solution.
MORE IN NETWORK SECURITY

Product Information and Resources for Technology You Can Use To Boost Your Business

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.