Sobig Worm Attacking RBL Lists? 260
Ubi_NL writes "According to the Register there is a close correlation between the DDOS attacks on a number of anti-spam lists and the presence of the Sobig virus. Now that Monkeys.com is gone, and spamhaus.org is taking heavy blows, are the spammers actually winning the battle by using viruses?"
taking have blows (Score:2, Funny)
Re:taking have blows (Score:2)
What about Aattacking (Score:3, Funny)
DDoS (Score:2, Interesting)
Maybe they were creating a network of DDoS zombies.
Re:DDoS (Score:2)
Of course, maybe it should be done in such a way that the central repository makes the RBLs and hands them out to clients. And clients can query eachother for the file, using some sort of crypto signatures of course, for authenticity. In this
Re:CvD's .sig (Score:2)
If you look at the statement in a truly logical way, yes, you are correct.
Re:DDoS (Score:2)
Yes, people are thinking about that. Check NANAE.
Useless links (Score:2, Insightful)
No point in providing useless links..
And how could they win? (Score:3, Insightful)
Re:And how could they win? (Score:5, Insightful)
do you actually think SMTP would get supplanted in the near term (>5 years) with an incompatible solution?
Do you think there won't be new and better anti-spam solutions before SMTP is supplanted?
(if you answered yes to either of the above, your world view is distorted and you need to stop drinking so much
Re:And how could they win? (Score:3, Interesting)
If the spammers are able to shut down spamfiltering services in this way, there will be a significant demand towards getting SMTP replaced by a smater protocol, that will not allow spamming in the form we see it today = spammers lose.
To install new software on all mailservers is quite a task. This is likely to take time, and be quite an interruption = everyone lose.
There's also a great
Re:And how could they win? (Score:3, Insightful)
We're not talking about spamfilters, we're talking about RBLs, which are usually more of a problem than a solution.
Granted that spamhaus provides more services than an RBL does (like providing names of those who should be crucified), but both the original parent of this thread and the article summary are refering to RBLs.
Re:And how could they win? (Score:2)
This wouldn't happen because Microsoft is not entirely stupid. This would be akin to Windows Media Player only playing WMA, or Internet Explorer only working with IIS sites.
It would also be akin to Windows supporting Win32 instead of POSIX applications, or to new versions of MS Office having new fil
Re: (Score:3, Insightful)
Re:And how could they win? (Score:3, Insightful)
However, these will only address the issue of a website or online store passing your email address around when they shouldn't (or idiots like Lycos and Yahoo who think sending emails to registered users is cool even when they have not opted in for any). It will not cope with the hardcore spammer who uses spiders to pull addresses from webpages/usenet postings or those that use random-garbage
Re:And how could they win? (Score:2)
--jeff++
Where's the hard evidence? (Score:4, Interesting)
OTOH, I have no friggin' idea what I'm talking about...
Re:Where's the hard evidence? (Score:5, Interesting)
I was trapping infected workstations by monitoring perimeter firewall logs for DNS calls to the root servers, as this is a feature of its activity. Pity I didn't have time to find out what it wanted to resolve, because that could have been interesting.
Re:Where's the hard evidence? (Score:2)
Kristian
Not really surprising, is it? (Score:5, Funny)
With the efficiency of spam filters and widespread use of blacklists and such, how can the spammers actually make any money? It's logical that they (the spammers) should try to bring attrition to the defenses of mail servers.
Btw, I have a novel idea for bringing spammers out of business. OK, here goes: spammers want to sell you penis enlargement programs, viagra, and pr0n right? Well, what if someone sets up a company solely dedicated to selling these things at the lowest price possible? People could just go to AllMyPerverseNeeds.com and get their fix cheaply and securely. Obviously we can't compete with Nigeria type spams, but it would bring down a lot of spam I think. So, anyone in favor of starting a non-profit Viagra depot?
Re:Not really surprising, is it? (Score:2, Informative)
Re:Not really surprising, is it? (Score:2)
Great. They could then send emails to everyone on the internet so that they know not to buy from the spammers...
Re:Not really surprising, is it? (Score:3, Funny)
As an example, I would never say to one of my co-workers "Y'know Bob, my penis is kind of small. The wife is really having problems with it l
Re:Not really surprising, is it? (Score:3, Funny)
And it works! My wife has never been happier, if you know what I mean..."
"well, I tryed that, but I just got some kind search engine."
Re:Not really surprising, is it? (Score:2, Funny)
Maybe we could pool our money and "sponsor" couple of articles in Cosmo entitled Geeks: They know which buttons to push and Computer Scientists: Should you upgrade your current RAM (wink wink, nudge, nudge)
Re:Not really surprising, is it? (Score:2)
Re:Not really surprising, is it? (Score:2)
Attempted slander against anti-spam services also (Score:5, Insightful)
---- quote --------------
Dear Internet user.
We are an organization dedicated to stopping spam. Please help us as we are
funded solely by private donations.
visit www.spamcop.net for full details. Or you can send your donations to:
Julian Haight
PO Box 25732
Seattle, WA
98125-1232
As you can see by this message unsolicited e-mail is an invasion of your
privacy. As you can also see it can be sent anonymously
We will continue our efforts until all spam is eliminated.
To join please visit www.spamcop.net or contact
jkdom@mail.julianhaight.com
We will continue to send out this message until we convince all ISP's to
stop all spammers.
!!!Stop low-lifes from invading your inbox with their junk!!!
---- end quote ------------
If they spew out fake spam which can only be meant for slanderous purposes, would you really expect them to *not* be in the virus game. Almost all these Windows viruses, if you hexdump them, have smtp capability. It's quite thinkable that a fair amount of them are really experiments rather than 'bad things done to innocent users because the virus writer likes doing that'.
There must be a lot of money involved in the art of spamming still. I wouldn't be surprised if spamhauses are partially means of laundering money as well (think about it). Either way, these people *are* criminals and one should consider them as such.
Re:Attempted slander against anti-spam services al (Score:2)
If they spew out fake spam which can only be meant for slanderous purposes, would you really expect them to *not* be in the virus game. Almost all these Windows viruses, if you hexdump them, have smtp capability.
Then it is suitably ironic that SpamCop does not allow reporting of virus-originated spam. If there is some connection between Sobig (and other Windows virus email) and spam fighting sites being attacked, then I would also think that SpamCop isn't that much farther down on the list of attacks
Re:Attempted slander against anti-spam services al (Score:2)
Nothing new (Score:2, Funny)
Just look at the godawful appearance of the meat, and smell the nasty stench from the can : how can you *not know* there are viruses in spam?
Yuk
What about netstat? (Score:2, Insightful)
Re:What about netstat? (Score:2)
DNSBL queries are cached, which is a big part of the reason for using DNS. Secondly, I would think the DNSBL administrators would know the difference between usage of their own service
Re:What about netstat? (Score:2)
Note that OpenRBL [openrbl.org] is back up, using a distributed proxy system to weather the DDOS (which I'm currently trying to find more info about, it is technically very interesting). You can search spamhaus records (among many others) from there.
Re:What about netstat? (Score:2)
If openrbl is rotating between mirrors, that's great. However, the issue remains: spamhaus's actual web content is what's very valuable to me, and it's not mirrored anywhere. I concede that there's good reasons for centralizing the content, but it also creates a single po
Re:What about netstat? (Score:2)
Just trying to look at every possibility. I'll concede it's (rather) unlikely, but I suspect that the sobig doing the ddos is probably equally unlikely.
Realtime RBL updates? (Score:2)
Of course, I could be wrong, so I'll look forward to being corrected (flamed) soon
Simple solution (Score:2, Informative)
This would mean that Spammers are Terrorists: (Score:4, Funny)
MOD PARENT UP (funny!) (Score:2)
Re:This would mean that Spammers are Terrorists: (Score:2)
Re:This would mean that Spammers are Terrorists: (Score:2)
Do they go after the companies that use spammers (Score:3, Interesting)
Spammers as cyber-terrorists (Score:3, Insightful)
Outlaw spammers, put an end to spam. Sometimes it's as simple as that. (And it works: Haven't seen much fax spam for years...)
Just be "Mr. Concerned Citizen" for once and send articles like this [theregister.co.uk] to your congresscritter [loc.gov] now. Let them know what spammers have already done "to your kids" (rather omit the "to your p...s" part even if you've ordered their pills and pumps) "and to your computers".
"Secure" network.. (Score:2, Informative)
It is unfortunate, however, that the majority of the spam I am receiving is from low lives who run a virus and now I get 143K size attachments being rammed to me.
If they are going to do something there has to be a concerted effort by ISPs to work together to kill of op
Re:"Secure" network.. (Score:2)
Re:"Secure" network.. (Score:2)
There are always going to be ISPs who are in the grey zone, claiming they are serving only legitimate customers but doing not enough to keep out the spammers.
E.g. ISPs that offer free dialup accounts, or even anonymous dialup.
There is no simple "kicking them out", there will have to be a time-consuming procedure of warning, warning again, and finally maybe a disconnection that will be subject to appeal etc.
A "secure network" could be practical wi
Re:I get 143K size (Score:2)
Re:I get 143K size (Score:2)
Spam, delete before reading.
What do spammers have to loose. (Score:2)
Huh ? (Score:3, Insightful)
English ?
And if such a site is under attack, why on earth are you linking it on slashdot's front page ?
Sunny Dubey
How cool?! (Score:4, Funny)
Only in my dreams...
They killed news groups and email's fading fast. (Score:2)
My main corporate email account is bloated with spam and with moron viruses sent to "all Microsoft Customers," of which I am not. It has got so bad that I just let the account bump against its mail box limit and bounce messages off.
Unfortunately, I have to use email for the auditability otherwise...
If it wasn't for spam, I'd have no traffic at all most days.
just respond in kind (Score:2)
How the attack works (Score:5, Informative)
Before the SoBig virus, each mail server receiving mail would, in the course of a day (about how long DNS black list records would be cached), get SMTP connections from a certain set of other mail servers. Most of those mail servers would be the ones from which email regularly comes in. Although people would have lots of email addresses in their address books, and even more in other files, most only regularly exchange mail with a small subset.
Enter the SoBig virus. It gathers up email addresses, not only from the address book, but also from email contents, web cache, documents, and just about everything else. Then it sends email to them in a probably uniform distribution of selection. The number of different domains being sent to from one computer in a day is now much larger than normal (in addition to the increased traffic). At the receiving mail servers, the number of different mail servers the SoBig spam is coming from is also much larger than normal. Now mail servers are getting mail from just about every mail server that has any user with any instance of a user email address that names that receiving server.
With the same mail servers sending mail over and over, the receiving server's DNS cache will have hits very frequently. With an increase in diversity of mail servers trying to deliver the SoBig spam, the number of cache misses goes up. Each cache miss means a query that recurses back to the DNS blacklist servers. Thus the query load on those servers goes up, effectively a DDoS.
Additionally, most DNS servers out there are "open recursive name servers". That means they let anyone, anywhere, do a recursive lookup. Spammers can drive even more load on the DNS blacklists by sending out DNS queries (with forged source addresses, of course, so they don't have to deal with the bandwidth of the answers) to those open recursive name servers, forcing more and more queries to focus in on the authoritative servers for the DNS blacklists.
This attack can be successful because spammers have far more network access from a wide variety of places than there are authoritative name servers for DNS blacklists (the ultimate target). And since recursive DNS lookup only has that server for a source address, all the DNS blacklists will see are queries from those open servers.
One way to address some of this problem is to close off recursive lookups. But given that millions of networks are run by incompetent or non-existant administrators, that isn't likely to happen on the scale needed to prevent the abuse. And it won't stop lookups by the receiving mail servers trying to check out all the different SMTP connections due to the spam from the viruses.
Blacklists will most likely end up having to be done by a means other than DNS, unless blacklist operators can manage to acquire sufficient bandwidth and server power to ride out the loads (which could very well be even greater than the GTLD servers that host "com" and "net" would see). Some form of distributing a static list file will probably happen. And, unfortunately, that means whoever gets listed will have a much harder time getting out of all those distributed lists, as many people won't be updating them as often as they should. The original reason to use DNS was to have a relatively quick means to remove a listing and have it take effect throughout the internet. By breaking the DNS mechanism, the ability to remove a listing is what suffers the most.
What I hope will end up happening is that spammer networks and generic (dialup, cable modem, DHCP, etc) addresses get listed in distributed files, and the more transient cases still get handled by DNS. The listings in DNS would be the ones that won't be so important to big time spammers, so they would be less attractive targets of attack, and if attacked anyway, would not open up the major points spammers find easy to use (e.g. their own networks and the generic networks where open proxies are found all over the place).
Re:How the attack works (Score:3, Insightful)
There is no evidence that the SoBig virus was written by spammers, or even that the RBL DDOS is intentional. To me it looks like the RBLs simply can't handle the load from trying to filter out this virus, plain and simple.
Perhaps an improvement to filtering tools would be to rely as much as possible on bayesian and rule-base filters, and only contact an external
Re:How the attack works (Score:2)
I've said it before... (Score:5, Insightful)
The main problem here is that we have millions of hosts connected to the Internet that just aren't robust or secure enough to be connected to a public network (I'm mostly talking about Windows machines here, if you hadn't guessed).
There was a discussion last week on slashdot about ISP's doing egress filtering home users's connections and I'm all in favour of that.
Unless you're hell-bent on running a mailserver on your DSL line, there's no reason for you to go out on port 25. Even if you do run a mailserver, you should have your box forward all outbound mail to your ISP's mail relay. AOL and some other large ISPs won't accept mail from you if you don't anyway.
IMHO ISPs have a responsibility to protect the backbones from their lame-ass customers with compromised machines.
Reply rather than mod if you think I'm talking out of my outbound relay.
Re:I've said it before... (Score:3, Insightful)
Re:I've said it before... (Score:3, Insightful)
Well stop saying it. (Score:2)
I like to run sendmail on my cable modem. Don't give my ISP any ideas about blocking this port. They have screwed with me enough already (i.e. AT&T @Home blocking port 80).
I run OpenBSD, and I'd really rather not be punished for some Win32 idiot that opens every EXE in Outlook.
Conspiracy theory seems implausible (Score:2)
Re:Conspiracy theory seems implausible (Score:2)
Having been involved with a company that was incorrectly put on a blacklist (suspected of distributing spyware, with no proof or even attempt at proof, just one individual's speculation), I can certainly understand someone getting frustrated enough to retaliate.
We figured it out this summer (Score:5, Interesting)
You may mistakenly believe, as I did in the past, that spammers are just a bunch of unemployed losers that sit around late night bulk mailing ads for scams. It turns out that in fact they're well funded losers engaged in such a lucrative industry that they can afford to hire good programmers.
The series of windows worms we've seen this year had preset expiry dates -- ending each of the carefully released wild tests. The most recent versions (swen) have very efficient SMTP engines built-in; these are not amateur projects.
Thanks to Microsoft's monopoly of operating systems, spammers can easily deploy software around the world that relays spam. swen demonstrated the power of this software; many people were DDoS'd off the net. I alone received over 40,000 emails carrying the worm.
Except an all-out-spamwar to break out in 2004.
Re:We figured it out this summer (Score:3, Funny)
How about an all out virus war? Write a virus that stealth installs AVG and let it run loose. I can't wait to see the Symantec advisory on that:
"This trojan installs a competitor's product. Here is the remove tool and a link to buy our product."
Off the wall time (Score:2)
SPAM is successful because of a simple formula:
(Number of messages sent + cost of sending) / time = $$
Why not simply slightly revise the SMTP standard to only permit a fixed number of messages per sender over a period of time? For example only allow say 20 recipients per message per day? If you need more than that, then perhaps have some form of payment system? Isn't it a bit rid
Proposal for a DDOS-immune RBL (Score:4, Interesting)
The list is a re-emplementation of a DNS-dased RBL, so to allow current MTAs to access it without modification.
The RBL servers are distributed, PRIVATE AND SECRET, in order to avoid being DDOSed. The servers are ordinary BIND, whose zone file is updated by a process to be implemented.
Those willing to use the RBL service have to run their own DNS server - they are free, however, to allow other trusted people to use their services; only them are going to be affected by an eventual DDOS, but not other users of the DRBL.
The RBL information is distributed via USENET. USENET has proven it's ability to survive all sorts of attacks in the past. It has survived the church of scientology, therefore it will survive chickenboners. It's distributed nature makes it quite invulnerable to the kind of DDOS attacks that currently affect centralized DNS RBLs.
The list maintainer posts PGP-signed updates to USENET via a network of trusted volunteers who do it from dynamic IP addresses of disposable dialup accounts. For safety, the IP addresses are changed immediately following the posting of updates, in order to avoid being DDOSed.
Authentification agaisnt spoofing and flood attempts is provided by the PGP signature.
The RBL users then scan USENET for the updates, who, once authenticated, are used to update the zone files on their private and secret DNS servers.
Re:Proposal for a DDOS-immune RBL (Score:2)
Are you suggesting publishing entire lists of vulnerable hosts in the clear?
If I was a spammer, I wouldn't exactly be unhappy about that. No need to do port 25 scanning for open relays any more, just get 'em off Usenet where the good guys posted them!
Re:Proposal for a DDOS-immune RBL (Score:2)
That kind of defeats the anonymous/distributed purpose, I guess.
Re:Proposal for a DDOS-immune RBL (Score:2)
I am afraid the spammers are winning (Score:2)
So, in the face of this spammers' blatant endevour, what is the level of interest of
Re:I am afraid the spammers are winning (Score:2)
Re:I am afraid the spammers are winning (Score:2)
Re:Viruses - not necessarily. (Score:2, Informative)
Re:I tend to think that spam is a virus... (Score:2)
Re:going postal on spam (Score:2)
Damn, I'm lame today.
Comment removed (Score:5, Insightful)
Re:Spam ostrich (Score:2)
Re:Spam ostrich (Score:2)
There is at least one gaping hole in your argument, namely that blacklists are also suppressing free speech. You Suck.
Comment removed (Score:4, Interesting)
Who owns the First Amendment? (Score:3, Interesting)
It's not quite that simple. It's true that the first amendment mainly serves to keep the government from supressing speech. But private entiti
Re: (Score:3, Interesting)
Re:Who owns the First Amendment? (Score:3, Interesting)
Few shopping mall owners would agree with you. But that's neither here nor there. If property rights trump leafletting rights, then mall owners don't have to have a good reason for forbidding leafletting. Or any reason.
Re: (Score:2)
Re: (Score:2)
Re:Spam ostrich (Score:2)
You're the one that suck, sockpuppett. Spammers have inserted a crank in your nether region and are turning it, sock.
Spamming isn't frea speach, it's theft of ressources. Nowhere in the world advertisements are considered frea speach; it is perfectly legitimate for PRIVATE NETWORK OWNERS to restrict traffic on THEIR OWN NETWORKS as they see fit. Hence the use of blocklists to cut access
Re: (Score:2)
Re: (Score:2)
Re:Spam ostrich (Score:2)
I don't agree with fmaxwell's assertion -- I think this is a good thing.
Re: (Score:2)
Re:Spam ostrich (Score:2)
Re: (Score:2)
Re:I hope so! (Score:2)
You're kidding, right? (Score:2)
You're kidding, right? Bayesian filtering is far from perfect. I've used Mozilla's built-in bayesian filtering as well as Spambayes' far-more-effective filtering system. There are still many spam messages let through in both instances. An
Comment removed (Score:4, Informative)
Re:More Harm Than Help (Score:2)
Yes, but people just don't know what to do anymore. I know bosses who go really mad at admins when spam gets into their mailboxes. It happened to me too. Of course it's not the right solution, but we need some solution, and we need it now. It's sad, but what
Re:More Harm Than Help (Score:2)
Except for the bandwidth costs, which are a big part of the spam problem.
As for the rest of your comment, it's so outstandingly stupid that I won't even bother to comment. And now that I think of it, this is the second anonymous comment that I've seen in this thread slandering RBLs for no reason. What, do spammers read Slashdot too?
Re:More Harm Than Help (Score:2, Interesting)
Oh it's you again. You're still pissed off because your ISP harbors spammers and you think that you're not somehow supporting that by helping your ISP stay in business.
As to your statement about Bayesian filtering ... there are many negative effects. First, it works on the basis of content. What makes mail be spam is not what the content is; it's that the senders are using bulk methods to send to people who didn't want it. I do get some mailings that I have optted in to, which if they were sent to peop
Re:More Harm Than Help (Score:2)
In the private sector (the internet is a network of PRIVATELY-OWNED NETWORKS, there is no place for a "justice system". Those network operators are perfectly allowed to BLOCK TRAFFIC THEY DON'T WANT FROM THEIR NETWORKS.
What part of MY NETWORK, MY RULES don't you get?
Re:no SMTP? (Score:2)