How Hackers Identify Their Targets 95
narramissic writes "In a recent article, security guru Brent Huston writes about research he did to get inside the minds of spammers and expose some of the processes they use to identify potential targets. Huston says that among the four common ways that spam is spread, the most common method that spammers use is via open relays. Huston's research also revealed that 'they were doing much more server analysis' than he had expected and that they take a multi-step approach: 'They scan the server for proper RFC compliance, and then they send a test message to a disposable address. Only after these are complete did they adopt the tool to dump their spam.'"
How Hackers Identify Their Targets: (Score:5, Funny)
1) Look for SSID "Linksys"
2) Connect
3) ????
4)> Profit!
Re: (Score:1)
Duh... It's so obvious... (Score:2)
Re: (Score:1)
Re:Duh... It's so obvious... (Score:4, Informative)
See http://postfix.it-austria.net/releases/official/p
I really get sick of this sendmail bashing. There are problems with sendmail and they are trying to rewrite sendmail to solve them. There is no such thing as perfectly secure software. Even OpenBSD has had a remote security hole in 8 years
Re:Duh... It's so obvious... (Score:5, Informative)
Postfix 1.x:
Affected By 1 Secunia advisories
Unpatched 0% (0 of 1 Secunia advisories)
Postfix 2.x:
Affected By 0 Secunia advisories
in contrast, look at Sendmail 8:
Affected By 10 Secunia advisories
Unpatched 10% (1 of 10 Secunia advisories)
So, given that there are unpatched vulnerabilities in Sendmail, why should you wait for the team to finish re-writing the code? Now, it is possible that Sendmail has some advantages in very high volume situations (although there are some older benchmarks that show Postfix was faster), but why would you want to use an MTA that is more difficult to configure and has known vulnerabilities?
I believe the main reason that people use Sendmail is that, having gone to the trouble to learn how to configure it, they don't want to waste that effort (as well as it being the default MTA in many distributions).
Re:Duh... It's so obvious... (Score:4, Informative)
Oooooh! Unpatched vulnerability!! Eek!
Sendmail fails to log all relevant data [secunia.com]
Critical: Not critical
Description:
Sendmail fails to log all details about connections if supplied with an IDENT of more then 95 characters.
It is possible to hide your identity from the sendmail log, if you supply an IDENT that is more than 95 characters, information about your identity however will still be written in any email you may sent. The problem is that someone may try to footprint your system, but when you check your log files, you will not be able to find the IP address and hostname of the attacker (or spammer).
Solution:
The easiest way to log these data is by enabling logging on the firewall and making sure that the time is synchronised on the firewall and mail server.
Re: (Score:1)
Re:Duh... It's so obvious... (Score:5, Insightful)
Many times I imagine that rookie administrators are trying to get sendmail just to work right so they enable something they shouldn't. It works... and they never bother to address their issue correctly, or even know that they addressed it incorrectly.
Funny (Score:2)
This article suggest that hackers are primarily spammers, when there are many tactics, the largest involves malicious code on a webpage or bot-nets distributing worms via instant messangers.
Re: (Score:2)
You mean one can of spam?
I thought they were like blond giants, breathing fire, shattering backdoors, giants taller than trees, with pointed ears like RPG elves and eyes like fire and hands with plastic claws and hooks; seen as savages, as barbarians, as beasts blood-thirsty and mad with viagra and penis enlargement pills, with braided hair, clad in furs and leather, with bare chests, with great souvenier axes which, at a single strok
hacker /= spammer (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Funny)
Rating: 'Score -1, Funny' (Score:1)
Do we have a new rating for bad humour?
Re: (Score:1)
Re: (Score:2)
While you are correct, many spammers use botnets, which means they have infiltrated a large number of computers and installed malicious software on them. This arguably makes them hackers (some of them atleast, some can be characterized more as script kiddies). So it's not a huge error.
Also, one might argue that what spammers do is penetrate spam filters, just as other hackers penetrate computer security. It's a shaky argument, but it's not completely invalid. It all depends on how you define a hacker.
More spammers/cracker/phisher/virus cooperation (Score:2)
These days it's a lot different - crackers are using malware to turn PCs into zombies, and renti
Re: (Score:1)
Re: (Score:1)
hacker = someone doing bad things on the internet.
well,as far as i concern:
cracker = someone doing bad things on the internet/machines.while,
hacker = someone doing bad things on the internet/machines/programs to discover any vulnerabilities of those stuff and team up with particular in-charge person to tackle all the flaws and lacks.
Re: (Score:1)
My favorite tool... (Score:4, Funny)
Re:My favorite tool... (Score:5, Funny)
*BLAM!*
You have received this delivery of copper and lead because you or a friend subscribed you to the "Bullet of the Week" list.
To opt out of "Bullet of the Week", please have each spammer in your MLM's downline submit the following form in triplicate, including at least one of their own fingerprints, as well as one of your fingerprints, dipped in the bloody goo from your still-steaming remains.
Your security and privacy are important to us, so please allow 6-8 weeks for us to conduct the proper forensic analysis to verify the identity of your downline member before we can remove you from our "Bullet of the Week" list.
NOTE TO DOWNLINE MEMBERS: Pay no attention to the fact that the middle of the three forms includes the verbiage "By placing my bloody fingerprint on this form, I hereby opt in to the Bullet of the Week mailing list".
Re: (Score:1)
Killing spammers has been done (Score:2)
DVR Spammers On The Rise (Score:1)
Hackers != Spammers (Score:5, Insightful)
Re: (Score:2)
This is Slashdot, for cryin out loud! I would understand this type of glaring error in a Newsweek article, but in "News for Nerds"?
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
That's the line I was referring to, in case you really were wondering.
Re: (Score:2)
Re:Hackers != Spammers??? (Score:1)
Conflating spammers and hackers because they both use computers is like saying that crooks and cops are dangerous people because they carry guns. Bad example. You get the idea.
Oh, give it up, already! (Score:3, Interesting)
Re: (Score:1)
Re:Oh, give it up, already! (Score:4, Insightful)
Read "Hackers" the book, written in 1984, long before any of those media morons that you believe now had even thought of the word.
Hacker is a term of skill, cracker is a term for a person who breaks into systems. And as you say just because the media tells me a banana is a car doesn't make it so.
Re: (Score:2)
And good hackers are hardly ever newsworthy...
Re: (Score:2)
Re: (Score:2)
The list there is pretty good, the people on
Re: (Score:1)
Re: (Score:2)
I'm a hacker in the geek sense but I also refer to the illicit type as hackers too. Like you say, words are defined by how they're used by the majority AND they can have more than meaning.
In fact, the ONLY time I ever hear the term cracker being used to refer to in the "illicit computer activity" sense is here on slashdot when some old school pedantist gets his panties in a knot. In any other context is just a bread-like product eaten with soup.
Re: (Score:3, Insightful)
-matthew
Re: (Score:2)
Goddammit, where's our National Ministry of Language Purity?!? Slashdot demands it!
Misattributed motivation (Score:1)
Re: (Score:1)
Seriously though, I think the idea is that spammers think honeypots are more likely to run non-RFC compliant servers and that RFC compliant servers are more likely to be trusted by recipient servers. That'd be my guess at least.
If I had to guess... (Score:2)
#1. Testing that it isn't someone's zombie.
#2. Making sure that it's compliant enough to get through other people's anti-spam tests.
#3. Testing the response (like nmap's ability to identify the OS) to identify the actual server instead of relying upon what it claims it is.
If they were worried about avoiding honeypots, they wouldn't be continually scanning ranges containing addresses that they had previously rejected because they were honeypots.
And for me, the majo
Hacky Definitions (Score:2, Insightful)
They're talking about "crackers", "phishers", scammers and criminals. They're not trying to make a system do anything cool, except when it damages or robs a person. Just making a system do something unexpectedly cool is irrelevant unless it takes something from a person, not the system.
Re: (Score:2, Funny)
That, of course, before the star trek rerun and while celebrating the third aniversary of the day a woman let you touch her...
Re: (Score:1, Offtopic)
Re: (Score:1)
Re: (Score:2)
Er, ah, what's the difference again?
Re: (Score:3, Insightful)
One is where the person installs a mail server and doesn't know how to configure it.
The other is where someone runs an operating system and doesn't know how to use it.
Of course the latter might be more because it it was made by developers who didn't know how to write it.
Zonk, your stories have high suck ratio. (Score:2, Insightful)
Thanks but no thanks for this one.
ORDB.org (Score:2)
Possible Solution (Score:2)
Re: (Score:1)
Re: (Score:2, Informative)
#1 - alot of the time the ip address listed on the whois info is for the networking technical contact, in teeny weenie organizations this might be the same as the sysadmin, but often it's not. And in the end you'll end up wasting a bunch
of people's time trying to figure out what the hell you're talking about and who to route your message to.
#2 - most oranizations small enough to be an exception to #1 probably don't have sysadmins and will be doubly con
Re: (Score:2)
abuse@ works, and is excellent.
The Article is WRONG (Score:4, Informative)
Something Else (Score:2)
Re: (Score:2)
So there.. and stuff.
Hacker = Spammer? (Score:1)
Re: (Score:1)
Re: (Score:1)
They do? (Score:2)
Well, that's what my <insert service here> logs tell me anyways.
Test your own mail server (Score:3, Informative)
Fancy posting a link? (Score:2)
My experience is slightly different (Score:3, Interesting)
I'm doing anti-spam research, and although this sort of thing isn't my direct interest, I have dabbled enough to have implemented my own SMTP honeypot from scratch. My experience in doing so, and in tracking spam generally, is rather different from this article.
In the first instance, I'm surprised that botnets aren't listed as the #1 distribution vector for spam. Any computer criminal worth his salt uses a botnet these days. The really hard-core phishers not only distribute their spam that way, but reverse-proxy their websites through the botnet.
Open relays, on the other hand, seem to be relatively small beans in terms of actual spam distribution. Sure, I got a lot of hostile traffic on my SMTP honeypot, but it was a lot of sound and fury signifying nothing. Nearly all the relay-exploiting activity originated in Korea and sent non-English (presumably Korean) spam.
As for their testing of RFC-compliance -- what a joke! Most of the relay-testers I encountered couldn't even get SMTP syntax right: I had to adjust my parser to allow extra whitespace and other brain damage. What they test for is delivery. As far as I can tell, they don't give a damn about anything else but whether the mail passes through your system and into their test account (typically a free webmail account, like Yahoo!). I found that when I manually forwarded a test message out of my honeypot to the test address, I would get a flurry of mail representing an actual spam run (not just a relay test message). It gives one a certain smug satisfaction to know that you've just null-routed an entire spam run -- the first couple of times, at least. After that you realise that it's about as significant as taking a piss in the Pacific, and stop wasting your time.
The article says of the web-form distribution vector that "the spammer community maintains a database or list of vulnerable forms". I think their database is called "Google", or something like that. I get constant attempts at compromise on my phpBB forum, and I think that works the same way. Why maintain a database when you can just plug an identifying phrase into a search engine?
I should mention that the spam experience can vary distinctly from person to person, so my different experience doesn't necessarily indicate sloppy research on the part of this reporter. The article gives me the impression that this is his first foray into spam research, however.
Re: (Score:2)
When spamers sell their services to the suckers that pay them, they will often do a free run of 10,000 to 100,000 and those end up with a very high hit rate on the suckers server so it looks like they will get far more when they pay up for the 800 million messages.
Its almost election time. Have you asked your running Attorney General why they haven't busted anyone for
Much ado about almost nothing (Score:1)
Except - maybe - the level that spammers take to test the MTA for RFC compliance. But then, after all, is that worth an article and a mention on /. ?
Here we still get plenty of spam from webmail and stuff. Here I couldn't confirm the 90% 'all open relay' thingy. As long as 'open relay' indicates a proper box, meant and setup as SMTPd and relaying. Personally, I don't call an owned clickety-click box an open relay. Call Redmond.
How Hackers Identify Their Target? (Score:1)
Hacker!=Spammer (Score:1)
thinking like a hacker (Score:1)
spammer (Score:1)
2. Send spam through compromise hosts
3. Broaden using web forms
4. Spread through open relays
how hacker identify their target (Score:1)
Crackers are now target home users for cash (Score:1)
Crackers are now target home users for cash. Consumers at home are now on the main target of malicious hackers intent on enriching themselves. Vulnerabilitie
Crackers are now target home users for cash (Score:1)
Crackers target home users (Score:1)