Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Spam Security Software

Examining an Automated Spam Tool 415

Saint Aardvark writes "SecurityFocus has published an excellent column detailing how spammers r00ted an Apache server, and used it to send spam. The tool they used is (I hate to admit it) pretty sophisticated: it has macro capabilities, picks up email addresses from and reports success or failure to the master server. It's a very frightening read...and so is this: Message Labs reports that they now intercept 27 spam emails per second, up from 2 per second this time last year. Virus-created proxies are mainly to blame."
This discussion has been archived. No new comments can be posted.

Examining an Automated Spam Tool

Comments Filter:
  • by BJZQ8 ( 644168 ) on Tuesday December 09, 2003 @03:33PM (#7672110) Homepage Journal
    All this really makes me wonder when the death penalty will be approved for spammers. Or at least some harsh beatings...
    • by taperkat ( 570124 ) <kirakat@yahoo.com> on Tuesday December 09, 2003 @03:35PM (#7672132)
      can't we just beat the stupid people that actually respond to spam, thereby making the spammers more money to keep berating me to get my cock enlarged?

      after all, I am a female.

      • I'll see your penile enhancements, and raise you two mortgages and a college degree from a school of YOUR choosing.
      • by calebtucker ( 691882 ) on Tuesday December 09, 2003 @03:41PM (#7672224) Journal
        I totally agree. While I really hate the spammers I think I might hate the people that actually buy stuff from spam a little bit more.

        If you think about it, there are some really intelligent spammers (even though they are disgusting scum of the earth). They're always one step ahead of us and are figuring out new ways to spam us.

        On the other hand, the people who buy stuff from spam are just plain morons. period.
        • If you think about it, there are some really intelligent spammers. They're always one step ahead of us and are figuring out new ways to spam us.

          I think you're giving them too much credit. Technically, it's a lot harder to selectively ignore certain people then it is to yell at everyone. Staying "one step ahead" really isn't that difficult.
      • by Anonymous Coward
        People who respond to Nigerian spammers get taken.
        People who buy pump&dump-spamvertised stocks lose their money.
        People who buy bogus-prescription opiate painkillers go to sleep all the time and lose their nationwide radio shows.
        People who buy penis enlarger pills have their dicks fall off. The problem is that they're usually older men who have already made their contributions to the gene pool, so Darwin doesn't get them in the end.

        The problem, of course, is that all of these bad things happen to the

      • by ebonkyre ( 520924 ) on Tuesday December 09, 2003 @04:00PM (#7672470)
        Well, there's no accounting for spammers' tastes. Judging from some of the spams I've seen, females with enlarged cocks are apparently pretty popular with these folks...

      • Too the parent and the parent parent posters...

        You both make excellent points,
        a. go after the spammer
        b. go after the people that fall for it

        Yet they're both chicken before the egg type of solutions.

        It was a weak protocol that let the genie out of the bottle. Open relays were a part of the net in the beginning because spam didn't exist, there was more co-operation between sysops, and because the net was mainly comprised of scientific and academic types.

        Actually, what is really needed is a new mail proto
    • by tds67 ( 670584 ) on Tuesday December 09, 2003 @03:45PM (#7672279)
      All this really makes me wonder when the death penalty will be approved for spammers. Or at least some harsh beatings...

      No, not yet! I'm only halfway through my penis-enlarging regimen!

    • by Verteiron ( 224042 ) *
      Yeah, send 'em into the organ banks. Mind you, if my arm falls off, I'm not sure I'd like to know my new one might have come from a spammer...
    • by arivanov ( 12034 ) on Tuesday December 09, 2003 @04:27PM (#7672848) Homepage
      You will need an ICBM version and Putin's agreement to let it through and not pay you back in the same currency with interest.

      Jokes aside, while not being compromised myself I have gone through a similar process investigating distributed server farms on cable and DSL serving counterfeit software (once again advertised by SPAM). In all cases the final step ended up being somewhere in Russia at least 600km from of Moscow.

      The method of intrusion is different though. In all cases it is windows software. Common examples are the one which copies DVDs to CDs (with all offers seen over the last 2 months being a trojan). Basically this, along with several similar common SPAM sucker gatherers is used for guess what - to gather suckers. The software actually works, but it contains a fairly sofisticated remote access trojan.

      This has recently been extented to include sucker gatherers introduced in counterfeit branded software. Basically, you pay 39$ for a counterfeit Win XP pro at "OEM Clearance Sales" and get a Win XP pro with a "surprise".

      Servers are all over the world, mostly on cable networks (strangely enough very few DSL ones). DNS (which is the weakest link) is run by known "questionable" marketing hosting sites usually in the US.

      With the number of suckers around trying to copy DVDs onto CDs frankly I do not see a reason for all the effort into hacking sites with vulnerable lame PHP software. So I guess these were some "new kids on the block"
  • by bigberk ( 547360 ) <bigberk@users.pc9.org> on Tuesday December 09, 2003 @03:34PM (#7672127)
    Spam is profitable, and this is becoming a huge underground business. Spammers regularly compromise other systems and install sophisticated software to allow easier spamming. Here's a document that describes the link between spam and viruses [sysdesign.ca]
    • Spammers regularly compromise other systems and install sophisticated software to allow easier spamming.

      I could have sworn that this was illegal. I mean, it's like some random person changing the lock on my door, giving me a copy of the key, but keeping a copy for themself. If they don't have my permission to do that (read: informed consent), I'm willing to bet that they'd be severly prosecuted.

      If, however, it's NOT illegal, what the hell? There'd better be a good reason for it not to be.
      • by Vainglorious Coward ( 267452 ) on Tuesday December 09, 2003 @03:43PM (#7672244) Journal

        Spammers regularly compromise other systems and install sophisticated software to allow easier spamming.

        I could have sworn that this was illegal.

        It is illegal, but then again, many of the products and services the spammers are pimping are also illegal. The legality (or not) has very little to do with it.

        • It's illegal to sell crack too, but some people do it because they can profit from it... just like some people are dumb enough to buy it.

          Really, the drug/user market isn't that much different from the spam/buyer market...except perhaps more people hate the spammers...
      • by Urkki ( 668283 ) on Tuesday December 09, 2003 @03:44PM (#7672269)
        Of course it is illegal. The problem is catching those that do it. The actual spam marketers will be hard to prosecute for it just because they use services of other "businesses" for delivering their marketing material. And actually getting these "other businesses" to court might be rather hard if they operate in some 3rd World pirate heaven, have no public office, and all business transactions are handled electronically, and are purposefully hidden or obfuscated.
        • If you received an ad in the mail for my product and the ad was contaminated with anthrax, wouldn't I be liable? Maybe not if I told you I used a mail service to send my ad, and that they must have done the contaminating, but at the bare minimum, I would be expected to fess up as to who the mailer is. If I didn't know who the mailer was (blind credit card form or somesuch) I might be guilty of negligence - at least I'll bet a civil suit would say so, because someone has to be blamed for the contamination. S
      • The FBI isn't going to investigate someone hacking your home server. You need to show something along the lines of $250K damage before they'll even listen.

        Not a good reason at all, but unavoidable I imagine. If only we could link spam to illegal music downloads! Let the RIAA subpoena them all!
    • Comment removed (Score:5, Insightful)

      by account_deleted ( 4530225 ) on Tuesday December 09, 2003 @03:53PM (#7672375)
      Comment removed based on user account deletion
    • why not e-stamps? (Score:4, Interesting)

      by goombah99 ( 560566 ) on Tuesday December 09, 2003 @04:01PM (#7672485)
      How come the idea of e-stamps is not getting any traction? The concept is that you are assessed a small charge for sending unwanted mail.

      I dont see what the technical or social barriers are. For example, it would not require any change in the way mail is transported. Instead it would all be handled by the recipient's browser.

      consider the following straw man scheme. I send you an e-mail.
      1) If I am in your white list the e-mail is accepted.
      2) if not then the e-mail is examined for a signed, serial numbered e-stamp and if present a short message is sent to central post office to debit the senders account one penny, and a receipt is returned to my e-mail program which then lets the message in.
      3) Finally if the message does not contain a stamp and is not white listed, the message is put in a spam folder and a memo sent to the sender (me) telling me that I need to request permission to send e-mail.

      The last step is how for example Earthlink's highest level spam blocker works. If most messages are spam then of course it doubles the total number of messages sent, but does not double the total message sizes or hand shaking. To the extend that it works, the post offices will only be consulted if the sender is not in the white list so unused stamps can be reclaimed. Moreover one could have the option of refunding the senders stamp if the message were welcome.

      I dont see what the sociologocal or technical hurdles are. Not every one has to be using the stamp processing client program. When stamps are not present it defaults to the earthlink system. When they are is skips that nuiscance.

      the best part is that legitimate direct mailers might very well be willing to pay the postage to send you an advertisment but presumbaly in many cases these would be targeted ads to people with potential interest.

      • How come the idea of e-stamps is not getting any traction?...I dont see what the technical ... barriers are.

        No offence, but many people more technically gifted than you or I have been wrestling with these issues for years and still haven't created a solution because the problem is a hard one to solve.

        On a simple level, consider this - in order to migrate from the SMTP protocol to "something better", we would either have to (a) have the entire world convert simultaneously to the new standard or (b) allo

      • by harrkev ( 623093 )

        Finally if the message does not contain a stamp and is not white listed, the message is put in a spam folder and a memo sent to the sender (me) telling me that I need to request permission to send e-mail.

        Yup. Then my anti-spam system sends you an e-mail and you, the spammer collect my penny...

        Or ... my anti-spam system sends you an e-mail telling you to request permission. Then your anti-spam system sends me an e-mail tellin me that I have to request permission. Then my anti-spam system sends you an

      • Re:why not e-stamps? (Score:2, Interesting)

        by letxa2000 ( 215841 )
        Not every one has to be using the stamp processing client program. When stamps are not present it defaults to the earthlink system. When they are is skips that nuiscance.

        The problem is that when you use the EarthLink system, you become a nuisance to hundreds of others around the world.

        I currently am up to about 300 spams per day. Most of those are forged addresses--which means they belong to someome, just not the spammer. If I used the EarthLink system I would be sending "challenge" messages to about

  • yep (Score:2, Insightful)

    by Anonymous Coward
    yet another example spammers aren't just mom&pop operations. This is a big business, with big money backing it.

    Something desperately needs to be done with SMTP to control this stuff....
    • Re:yep (Score:4, Funny)

      by John Seminal ( 698722 ) on Tuesday December 09, 2003 @03:51PM (#7672361) Journal
      What made you think spammers were ever mom&pop. It is their son in the basement. Can't get a job at K-Mart, so he sends out spam. A penny here, a penny there, and soon he can afford a subscription to milfhunter.com.

      All jokes aside, this sucks that people will steal bandwith and commendeer other peoples computers. If we do not correct this problem, Microsoft might decide their "trusted computing" is the anwser because it would identify everyone and market it as "more secure". Have you seen the butterfly that keeps porn away from your kids? Or ISP's could blacklist anyone who is not on their "approved list". I guess freedom of speech is wothless if 100's of spammers are yelling all at the same time. Is there any way we call all yell "SHUT UP" back at them?

      • It is their son in the basement. Can't get a job at K-Mart, so he sends out spam

        Did you read the article???

        Any kid that could pull this off obviously could get quite a nice job as a sysadmin. I could not even follow most of the article!
    • Re:yep (Score:5, Insightful)

      by Urkki ( 668283 ) on Tuesday December 09, 2003 @04:02PM (#7672487)
      • Something desperately needs to be done with SMTP to control this stuff....

      Yes. It needs to be completely blocked at backbone routers, and new and better alternative developed.

      So, the steps would be
      1. develop a better alternative as fast as possible, and make it as simple as possible to implement.

      2. deploy the better alternative for test use.

      3. develop a fixed version 2 of the better alternative after it's holes are discovered.

      4. deploy the fixed version.

      5. block SMTP and version 1 of new protocol at international and national backbones and national borders, so that everybody is forced to switch.

      So SMTP would still be completly usable for example inside organizations, so if a company has huge installed base of legacy software, they could have internal SMTP-new protocol gateway.

      Of course this would require IETF to get their act together, and various governments to agree that this must be done, and actual new protocol to be simple enough and not contain patented algorithms or any other stupidities.

      So it will not happen. Then spam will overwhelm the internet transfer capacity. Then SMPT is blocked and free internet e-mail will cease to exist. Proprietary solutions will develop, but there will be a chaos. Incidentally, Microsoft will happily provide a closed proprietary system only usable from their operating systems.
  • Well... (Score:5, Interesting)

    by hookedup ( 630460 ) on Tuesday December 09, 2003 @03:37PM (#7672168)
    One day I noticed that one of my remote servers was sending 24 hours a day a continuous 11Kbytes stream, using the 100% of the upload bandwidth (128Kbits).

    Seems greed has once again turned around and bit someone in the ass (in this case it was a good thing). So all these spammers really need to do is slow down the avalanche of spam somewhat, and throttle their speeds when relaying. Otherwise, how long would this have went on for if he hadnt noticed his upload being maxed?
    • Exactly

      Thats why all our xdcc bots were set to have max upload speeds.

      And we didnt quite fill their hd's so that they didnt run out of space all of a sudden

  • If only (Score:4, Insightful)

    by goodbye_kitty ( 692309 ) on Tuesday December 09, 2003 @03:38PM (#7672172)
    If only we could harness the power of these cool (and working!) distributed systems to provide efficient peer to peer content distribution or an actual legitimate email system of some sort...
  • by Anonymous Coward on Tuesday December 09, 2003 @03:40PM (#7672206)
    This is obscene. How far will spammers go?
  • by Tim C ( 15259 ) on Tuesday December 09, 2003 @03:40PM (#7672208)
    If they're good, and are producing sophisticated tools and methods for spamming, then it's imperative that it is admitted, so people will understand the true nature of the problem and what anti-spammers are up against.

    One of the most fatal mistakes you can make in any conflict is to underestimate your opponent.
  • Bad getting worse... (Score:5, Interesting)

    by tuxette ( 731067 ) * <.moc.liamg. .ta. .ettexut.> on Tuesday December 09, 2003 @03:42PM (#7672233) Homepage Journal
    Other trends started this year and expected to increase in 2004 include the use of e-mail to trick people into going to what they think is a legitimate vendor's web site and provide confidential information, such as social security or credit card numbers, MessageLabs said.

    Although I haven't experienced spam that goes so far, I have received (in my special spam account for playing with Nigerians and lottery managers) quite a few mails with requests to confirm my e-mail address. It works like this - you get a mail saying something a la: "I am controlling the e-mail sent to my inbox for the following address: sucker@born.every.minute.com. By asking for you to confirm that you really sent email to me I can ensure that I receive no spam and that your email address really exists. This is a one time confirmation, please click the link below and your email will be delivered straight away, now and in the future. Regards, Alberto Huber"

    The funny thing about it was that the "I" in question was neither someone I sent mail to nor someone I know at all.

    Now if they think I'm going to go click the link to confirm that my e-mail address exists, then they would surely be willing to buy some property on Mars I have for sale. Radiation-free. Really.

  • stupid gap in PHP... (Score:4, Interesting)

    by kisrael ( 134664 ) * on Tuesday December 09, 2003 @03:44PM (#7672259) Homepage
    Actually, and yeah yeah yeah, I know there are probably settings around this, but that default of cgi variables automatically being turned into global variables of the form $same_name_as_in_the_form has always seemed to be asking for trouble.

    PHP, at least when I was looking at it a year and a half ago, always felt half-baked to me.
    • That's no longer the default. Not sure what version changed it.
    • Actually it's a stupid gap in admins and developers.

      You see Register Globals has been OFF by default since 4.2.0 which was released 22-Apr-2002.

      But yes it is a mess.
    • by kisrael ( 134664 ) *
      Guh...that previous comment was NOT flamebait and was NOT offtopic...if you RTFA, this misfeature of earlier versions of PHP is exactly the exploit used to hook into the system.

      Frickin' moderators, so many people are so quick on the negative triggers, and not in a helpful way.
  • New protocol? (Score:5, Interesting)

    by HornyBastard ( 666805 ) on Tuesday December 09, 2003 @03:46PM (#7672293)
    I think it's time we get a new mail protocol.

    If we can somehow get a list of relays authorized for the sender's domain, it would be easier to flag a message as SPAM.

    Also, I think the messages should be stored on the relay, with just a URL sent in the mail body. It would solve two problems:
    * The size of the message will be limited by the size of the sender's mailbox.
    * It will use more resources on the relay, and the admin should be less likely to run an open relay.
    • Re:New protocol? (Score:3, Informative)

      by gfilion ( 80497 )

      Also, I think the messages should be stored on the relay, with just a URL sent in the mail body. It would solve two problems: * The size of the message will be limited by the size of the sender's mailbox. * It will use more resources on the relay, and the admin should be less likely to run an open relay.

      This has allready been proposed by Dan Bernstein: IM2000 [cr.yp.to]

    • Re:New protocol? (Score:3, Informative)

      by quantum bit ( 225091 )
      There is. Check out SPF [pobox.com]. It's simple, built on existing protocols (DNS), and 100% djb-free.
    • by pjack76 ( 682382 ) on Tuesday December 09, 2003 @04:34PM (#7672959)
      Here's an idea, tell me why it won't work. :)

      Instead of having one mail server for your home or organization, you have two. Except one is secretly useless. It just blackholes everything that's sent to it.

      You buy another domain and list the blackhole as the MX record for the new domain.

      You sign up for a bunch of email marketing lists using addresses from the blackhole domain.

      Everything that gets sent to the blackhole server is by definition spam.

      The blackhole server also runs DNS. You set your real mail server's RBL DNS to point to the blackhole server.

      Every time the blackhole server accepts a connection on port 25, the blackhole server immediately drops the connection (so no wasted bandwidth) and updates DNS with the originator's IP address.

      You now have your own local blacklist, you don't have to trust somebody elses. Keep a log, if somebody bitches about it you can say "Well, somebody sent spam to my blackhole server on this date at this time from your IP. Suffer".

      You'd have to combine it with a whitelist to let Yahoo and Hotmail and so on through, but you'd still kill a lot of spam.

      Thoughts?

      • by schon ( 31600 ) on Tuesday December 09, 2003 @04:56PM (#7673288)
        Here's an idea, tell me why it won't work.

        OK, but remember, you did ask.

        First of all: what you envision is nothing new. It's called a 'spamtrap'.

        The most important thing is that it relies on security through obscurity - as soon as the spamtrap addresses become known, they're useless (and can actually be used to fsck you up.) If you think this won't happen, I urge you to read the article - this spam machine isn't stupid, and will find your spamtrap addresses faster than you think.

        Every time the blackhole server accepts a connection on port 25, the blackhole server immediately drops the connection (so no wasted bandwidth) and updates DNS with the originator's IP address.

        Pretty simple - anyone who knows the spamtrap address(es) can now DOS your legitimate mail server by sending mail to your spamtrap. (I realize you noted this, but included only Yahoo and Hotmail.)

        Spammers get your spamtrap address, they have infected machines on many different ISPs, so they send mail to your spamtrap using those ISPs' (again) legitimate mail server.

        Congratulations, you have just stopped receiving email from every ISP on the planet.
  • by RouterSlayer ( 229806 ) on Tuesday December 09, 2003 @03:46PM (#7672297)
    yes it's definitely profitable, this is part of the problem, a major part of it!

    even with all the crap that people are doing, new SMPT clients, new RFCs and bullshit, it's not going to work!

    why? because spammers pay their ISPs tens of thousands of $ a month just for the privilege of spamming!

    I remember an old story months (or years) ago about a spammer, got tracked down, the whole nine yards, the ISP refused to cut them off because they were paying the ISP over $50,000 a MONTH to send spam. These days they pay even more.

    So all your "checks and balances" don't do any good, because the spammers are VALID users (at least in the eyes of the ISP hosting them).

    And this is also why no one does egress filtering. AT&T US, etc won't do it because they get PAID to keep sending the stuff...

    face it, spam is BIG business, it makes millions, esp for the ISPs, etc.

    all your useless "valid" client checks, checksums, special SMTP servers, blah blah blah won't make a damn of difference.

    the only way is with either good (huge) blacklists or bayesian all over the place.

    and what someone said about "end users" not caring about bandwidth usage, not true. I'm an end-user, and I care, excess bandwidth costs me money dammit! I am my own mail server, so don't tell me a firewall on my server is gonna slow down the traffic. it doesn't.

    I keep to my original proposal, a massive blacklist. headache? yes, but it'd work if kept updated...
    • as a end user,you are an excetption not the rule.
      Most people don't care about bandwidth.

      "yes, but it'd work if kept updated..."
      never work, becasue A)some spammers are a legitimate ISP customer. You cu of that ISP you cut off al the non spamming emails.

      also, there is no insentive to spend the money to keep checking its validity all the time.

    • There was a great article in the local paper about how many ordinary businesses collecting email supposedly for customer service purposes are selling this info off, where it ultimately gets into the hands of spammers.

      I'm not sure how the spammers re-close the loop with mainstream businesses, but I'm sure its happening.
    • by phorm ( 591458 ) on Tuesday December 09, 2003 @04:05PM (#7672537) Journal
      I remember an old story months (or years) ago about a spammer, got tracked down, the whole nine yards, the ISP refused to cut them off because they were paying the ISP over $50,000 a MONTH to send spam. These days they pay even more.

      Because SPAM as a whole is becoming illegal in many areas, and much of what spammers do is already illegal. If the ISP is allowing the spammer to continue operation, and he is pumping illegal products/scams/etc then the ISP will be on the line.

      It's one thing to profit for unscrupulous activity, it's another to knowingly allow an illegal one.

      Making it easier to certifiably track spammers is part of the solution because if you can say with strong surety that an ISP is supporting the spammer... then you can take action against the ISP.
    • No, you are wrong. The real solution involves a multitude of changes. It requires blacklists, filters, open relay blocking, client verification, legislation and possibly other fixes as well.

      There is no magic silver bullet that is going to make spam go away. The key is bringing all of these various pieces together, thereby closing the loopholes bit by bit until it is no longer feasible for spammers to continue their operations.
    • yes it's definitely profitable, this is part of the problem, a major part of it!

      Spam is also profitable for all of the companies selling anti-spam products. How many of them would go out of business of spam was stopped tomorrow? Is it really in their best interest to stop spam?
  • spammer find away in, use it for spamming.
    Gets traced relativly easy to the server, a patch is issued.
    This is probably the most benign thing that can happen from an exploit, and it is easy to track down. Finding it in a research center would be better, but barring that, this ain't so bad.
  • Sheesh ... something good the politians could do if they weren't so clueless: put the people that write this stuff in prison.

    Rich.

  • that this intrusion is probably the work of some teenage kid who will never have to do a day of real work in his life. But at least stuff like this keeps us admins employed. . . at least some of the time.
  • OpenBSD on macppc (Score:4, Interesting)

    by Anonymous Coward on Tuesday December 09, 2003 @03:55PM (#7672396)
    Geez,

    This is going to make me move my web server to OpenBSD 3.4-stable on macppc even sooner. It would have two layers of defense against this kind of attack, even if the PHP hole was there.
    1. Chrooted apache means that necessary shared libs/utility apps for the binary aren't available immediately.
    2. PowerPC processor means that i386-binary payloads won't run

    Running under systrace might also help stop it from opening outbound connections.

    • OpenBSD on SUN hardware is even better: Sparc chips have built in executable protection.

      Sparc hardware nativly allows processes to set chunks of memory as "allow code execution, but don't allow self-modifying code".

      Unfortunatly curent x86 hardware lacks this feature without a lot of work.

  • by bigjnsa500 ( 575392 ) <bigjnsa500@yahoQUOTEo.com minus punct> on Tuesday December 09, 2003 @03:57PM (#7672429) Homepage Journal
    It was a pretty good article, but he leaves off one glaring fact. If he had kept his software up to date, this would never have happened. BugTraq says August 2002 when this was identified.
  • it should be noted that this wasn't apache that was rooted. it was a poorly written PHP app, using an injection technique.
  • Spam funders? (Score:3, Insightful)

    by 192939495969798999 ( 58312 ) <infoNO@SPAMdevinmoore.com> on Tuesday December 09, 2003 @03:59PM (#7672454) Homepage Journal
    Who exactly is funding all this spam? Is there one major media conglomerate behind it, like Viacom? That would be totally wild.
    • Re:Spam funders? (Score:3, Interesting)

      by leerpm ( 570963 )
      I doubt it. What does a giant corporation like Viacom have to gain from sending out penis-enlargement advertisements?

      The most reasonable guess along this line would be the drug companies trying to sell to an underground market. But everyone knows that the drug companies are fighting hard to keep the drug prices artificially high in the US, so what would they have to gain too? I mean, have you looked at most spam lately? It certainly doesn't appear to be a case of a real company trying to make a legimate p
    • Re:Spam funders? (Score:4, Interesting)

      by Urkki ( 668283 ) on Tuesday December 09, 2003 @04:28PM (#7672858)
      I guess porn business is what brings in most of the money for spammers.

      And then I suppose that once the basic spamming infrastructure is established and paid for by that, there's ready market for getting other businesses and plain scammers to do spam marketing, thus increasing spammer profits more and pushing down the price per email.
  • by Anonymous Coward on Tuesday December 09, 2003 @03:59PM (#7672461)
    I have 2 questions that I have always wondered:

    1. Most spam mails are selling something physical and are actual companies; why can't they therefore be tracked down and slapped with lawsuits easily?

    2. Why doesn't user education work? Maybe a mass education campaign towards users will make the spammers give up - I agree there will always be the odd idiot, but if 99% of users are educated, just like most kids know not to talk to strangers, there will eventually be a decline in such?
    • by Kjella ( 173770 ) on Tuesday December 09, 2003 @04:50PM (#7673205) Homepage
      1. Because it's usually some spamming company performing the spamming, not the real company. They only hired their "PR services", in which case you have to prove they did know it their marketing practices would be illegal.

      2. No, 99% is not enough. A 1% response rate would be insanely high. Even a 0,01% response would easily be enough. Because it costs next to nothing, with next to nothing in risk.

      To pull on your "99% of users are educated, just like most kids know not to talk to strangers" analogy, it wouldn't work if the pedos could ask thousands of children simultaniously (i.e. no cost of time) and none of those that refused would report it. Who cares if 990 turn you down, if you can have a 10-kid orgy every day? Sounds awfully cruel, but that's the way spam works today. They pray on the few stupid enough, and hope that the great majority will simply hit 'delete'.

      Kjella
      • 1. Because it's usually some spamming company performing the spamming, not the real company. They only hired their "PR services", in which case you have to prove they did know it their marketing practices would be illegal.

        True, but what if said companies were publicly outed and humiliated? What if an orchestrated effort was made to let said company know exactly how the world feels about their carelessness in hiring their PR firm? Would that not be sufficient to send the message that if you hire a PR c
  • by goldspider ( 445116 ) on Tuesday December 09, 2003 @04:00PM (#7672467) Homepage
    "Other trends started this year and expected to increase in 2004 include the use of e-mail to trick people into going to what they think is a legitimate vendor's web site..."

    That sounds suspiciously familiar, especially when you substitute "e-mail" with "innocent-looking links to Amazon.com".

  • I know it is selfish, but SpamAssassin does such a good job of killing of my spam, especially with Bayan (sp?) filtering, that I no longer care about spam. It eats up some bandwidth, but I have so few email addresses and emails are so small, I'll accept it.

    Now my main concern is not getting rooted (or the equiv').
    • by harlows_monkeys ( 106428 ) on Tuesday December 09, 2003 @04:38PM (#7673006) Homepage
      I know it is selfish...I no longer care about spam

      Not selfish. The word you want is stupid. Your attitude is equivalent to saying you don't care about massive water pollution because you've got a really good personal filtering system that can make a small amount of drinking water safe, so you don't care about pollution, say, killing crops.

      The problem with spam is that it is threatening to overwhelm the basic infrastructure of the net.

  • Finally! (Score:4, Funny)

    by fsmunoz ( 267297 ) <fsmunoz&member,fsf,org> on Tuesday December 09, 2003 @04:03PM (#7672499) Homepage
    First spam, then the Empire! Finally Portugal is regaining it's place! Seaway to India, you say? Do I ear Brazil? Was that "Eastern Empire" sir? Bollocks! It all fades away compared to the might of SBTF.NET!

    On a more serious note, the telephone contact given in the RIPE lookup is a bogus one (lacks one number to be a valid portuguese phone number), the "Rua do Norte" street doesn't exist in Lisbon and SBTF isn't listed in any portuguese site that deals with companies registration.

    Some say "bad publicity is good publicity"... I would rather not have my country mentioned by these particular reasons.

    But... the guy reporting it is from Spain... this could be some devious plot to, er, something. ;)

    cheers
  • spamtools (Score:5, Informative)

    by AeiwiMaster ( 20560 ) on Tuesday December 09, 2003 @04:07PM (#7672555)
    Hi

    I have made an eigenpoll [all-technology.com]
    to find the best spamtools.

    First ranking the tools you know,
    the it runs some data minning and find the best tool.

    Right now the list looks like.

    sa-exim
    Outclass
    Mail Scanner
    spamprobe
    POPFile
    SpamBayes
    SpamAssass in
    Vipul's Razor
    Blackmail
    bogofilter
    Infinospam
    Spamthis
    Shovel
    SpamBouncer
    Declude JunkMail
    spamhole

  • by Brandon T. ( 167891 ) on Tuesday December 09, 2003 @04:08PM (#7672570) Homepage
    You can fix this problem by catching attempts to modify the $GEEKLOG_DIR file via get or post methods at the top of the gallery/classes/geeklog/User.php file. Insert this line:
    if (isset($_GET['GEEKLOG_DIR']) ||
    isset($_POST['GEEKLOG_DIR'])||
    isset($_SESSION['GEEKLOG_DIR']))
    die('nice try buddy.');
    }
    The $GEEKLOG_DIR variable is actually set at the end of the gallery init file, so it should not be coming from any other directories. This is another example of why it's bad to leave register_globals on, as the whole problem could have been avoided otherwise.
    • by James_G ( 71902 ) <jamesNO@SPAMglobalmegacorp.org> on Tuesday December 09, 2003 @07:58PM (#7675493)
      This is another example of why it's bad to leave register_globals on, as the whole problem could have been avoided otherwise.

      Except.. it wouldn't have, in this case at least. Gallery works with register_globals turned off, I just checked.. but then I noticed the code (this is in init.php if anyone wants to check):

      if (!$gallery->register_globals) {
      if (is_array($HTTP_GET_VARS)) {
      extract($HTTP_GET_VARS);
      }

      if (is_array($HTTP_POST_VARS)) {
      extract($HTTP_POST_VARS);
      }

      The extract() function [php.net] basically takes everything from the _GET and _POST arrays and dumps them straight into the appropriate variables, which is exactly what register_globals does. Whether it was turned on or off, you would still be able to pollute the $GEEKLOG_DIR variable via get/post. This is a pretty braindead piece of coding right here, and makes me a little worried about using gallery. I hope they plan to fix this in the future.

      • by Otto ( 17870 )
        They added hack prevention code to a lot of gallery way back when.. My init.php has similar code to what you posted, but it also has this at the top:


        $sensitiveList = array("gallery", "GALLERY_BASEDIR");
        foreach ($sensitiveList as $sensitive) {
        if (!empty($HTTP_GET_VARS[$sensitive]) ||
        !empty($HTTP_POST_VARS[$sensitive]) ||
        !empty($HTTP_COOKIE_VARS[$sensitive]) ||
        !empty($HTTP_POST_FILES[$sensitive])) {
        print "Security violation\n";
        exit;
        }
        }

        Ess

  • by penthouseplayah ( 454492 ) on Tuesday December 09, 2003 @04:15PM (#7672648)
    In my dorm we have blocked port 25 from LAN to internet. It was thought to keep viruses from propagating from out network and keep people from setting up a spamserver. Now it looks like a very good decision. (they can actually only use our DMZ smtp gateway, which is antivirus protected).

    All ISP or the like should block port 25 outbound by default, and make people use the smtp server of the ISP. If people (1 out of 10.000) would like to use port 25 outbound, they should contact the ISP through a bureaucratic procedure. That would close the trojan hole at least.

    Are there any other ports (priviledged/unpriviledged) that one can safely block to avoid trojans and the like???
    • by tgd ( 2822 ) on Tuesday December 09, 2003 @04:30PM (#7672885)
      To do that ISPs need to allow SMTP authenticated users to send e-mail with any domain name attached.

      I have to run my own e-mail server, because Comcast (my cable modem provider) doesn't allow me to send outgoing e-mails with my real e-mail address, its go to be @comcast.net or whatever their domain is.

      If they block port 25, e-mail is effectively shut off for me as a usable technology on the Internet, and I'll be stuck either having to tunnel the e-mail to someone who doesn't have it blocked, or change ISPs.
  • Hah! (Score:2, Funny)

    I knew it all the time, Apache and Unix servers are among the most vulnerable on the planet. This could never happen to trusty old Windows boxen.

    ...oh, wait...
  • by martin ( 1336 ) <maxsec@nOSpAM.gmail.com> on Tuesday December 09, 2003 @04:21PM (#7672730) Journal
    1) make money (or is spamming that easy?)
    2) get my rc control car that gives me a reduced mortgage, life insurance and 'elongates' my love life :-)

    More seriously, the education needs to be for the people who buy off these people. If people stop using the 'services' then the spammers will move onto some other way of making money.
  • by grahamtriggs ( 572707 ) on Tuesday December 09, 2003 @04:21PM (#7672739)
    Let's first of all say I am no fan of spam. In fact, I hate it. All spammers - and virus writers - should be strung up and subjected to some real virii.

    However, some of these statistics are possibly obscuring reality. For example, let's take Messagelabs anti-spam service. Until recently, all emails from WorldPay - receipts, etc. - were marked as spam. All the traffic on an email discussion list that I have signed up for are marked as spam. Some commercial email notification lists that I have signed up for (ie. Maplin offers) are marked as spam.

    But none of those emails *are* spam. Admittedly, some spam emails do get through without being flagged. So maybe it's a bit 'swings and roundabouts'. And regardless, the situation is pretty depressing anyway.

    One thing I have been thinking about - and just wondering whether it should be entered as an Ask Slashdot item - are some of the 'cures' as bad as the problem itself?

    I work on biology / medicine journals websites, and we offer a number of automatic notification and general update services. Note that these are *not* spam - they are requested by individuals by signing up on the website - and instructions are given in every email in how to remove yourself from the list. And they are a very valuable service to many people that do choose to receive them. Yet it only takes 1 person to not bother to read or follow the removal instructions, or otherwise hit some other temporary (accidental) issue that holds up their removal, and then submit it to a blacklist service to bugger things up for many other people.

    So where is the regulation on the blacklist services? Where is the ability for *genuine* (provably genuine) companies to register their services in such a way that rather than getting blacklisted immediately, they have the opportunity to respond to the issue raised? Is this a small or large price to pay to partially stem the tide of actual spam?
    • by taustin ( 171655 ) on Tuesday December 09, 2003 @04:38PM (#7673013) Homepage Journal
      So where is the regulation on the blacklist services?

      The market regulates it. A blacklist that is too aggressive doesn't get used. It's really that simple. If your ISP blocks stuff you don't want blocked, compalin to them, or switch. If someone's blocking your mail, it's up to them to complain to their ISP. If they don't, they obviously don't object.

      Where is the ability for *genuine* (provably genuine) companies to register their services in such a way that rather than getting blacklisted immediately, they have the opportunity to respond to the issue raised?

      Most mail admins don't give a flying fuck whether you are a "genuine" company or not. I got spammed relentlessly by American Express, until I block their entire IP block until the heat death of the universe. If you don't want to be blocked, don't spem. It's not that difficult. Really.
  • by Animats ( 122034 ) on Tuesday December 09, 2003 @04:41PM (#7673067) Homepage
    Let's dig a bit. As usual, we ignore where the spam came from, and concentrate on where the money goes.

    The spam contains ads for the "Asta Design Group", which has been widely spamvertized. A bit of searching turns up this address: [seafishnet.net]

    • SeafishNET and the Asta Design Group
      360 NE 49 St
      Fort Lauderdale, Florida USA 33334
      E-mail: seafish1@ix.netcom.com

    Another lead [stewartsintlschool.com] gives us

    • The documents and information on this Web site are copyrighted materials of SeafishNET, Asta Designs and its information providers.... "SeafishNET" and the SeafishNET logo are registered trademarks of SeafishNET.
    • SeafishNET
      360 NE 49 St.
      Oakland Park, Florida 33334 USA
      (954) 351-7961
      seafish1@ix.netcom.com

    Same address and zip code, but in Oakland Park, a Ft. Lauderdale neighborhood. Now we have a phone number. Google gives us

    • Charles Fish, (954) 351-7961, 360 NE 49th St, Fort Lauderdale, FL 33334

    Checking the satellite imagery [keyhole.com], that's a tract house backing up to a six-lane highway. It's not a mailbox service.

    Since we're talking about felony computer intrusion here, that's the address to give the cops. This may or may not be the intruder, but they probably know who it is.

    • One thing interesting to me is that the English used in some of the log messages and other bits of this distributed SPAM system were very obviously written by someone for whom English is a second language. There wasn't enough of it to guess what their native language is, and their English is pretty good, avoiding the common mistakes that usually give away the type of native language.

      Given the the German and Russian addresses, I would not at all be surprised if the distributed SPAM software was written by
  • The overwhelming amount of spam I get now involves the advertising (and presumably selling) of a controlled substance--a prescription drug that is deemed a narcotic. The prescribing of this drug (and a few others in the spams) by legitimate physicians, and its dispensing by legitimate pharmacies are strictly regulated in some kind of effort to prevent the abuse of the drug--an abuse that is rampant in many areas of the US.

    I keep waiting to hear that the Federal authorities have taken some action in this regard. If you've ever been through US Customs (and especially if you're young, not white, or in any way "unusual" looking) you'll know that they make a great show of looking through everybody's sneakers and dirty laundry on the hunt for "illegal drugs." Even in these times of terrorism, it's their chief claim to fame.

    The potential for abuse seems enormous and growing to me. It also seems to me that a lot of the spams advertising this stuff originate in, or pass through, the U.S. If somebody in our town hung out a sign saying GET YOUR PRESCRIPTION NARCOTICS HERE--NO PRESCRIPTION REQUIRED, my guess is the police would take an interest. But we seem to have virtual open-air drug markets operating undisturbed.

    If anyone wonders how spammers make money, this is certainly one possible way, and I suspect it's incredibly lucrative.

  • by TheTranceFan ( 444476 ) on Tuesday December 09, 2003 @09:57PM (#7676435) Homepage
    I'm a relative Linux noob and I'm trying to understand this thing. I read the whole article, but there are a few things I'm not sure I get.
    1. Was his server really rooted? It seems like these bogus httpd's that were running were still running as www-data, the user this guy had Apache running as.
    2. Did I miss some escalation-of-privileges step, or does apache's user usually have this level of privileges? Like chmod'ing things it got with wget...yikes!
    3. I run php with register_globals=off. Is that enough?
    4. What's an easy way in Linux to tell if your outbound bandwidth is slammed?

    I was very impressed with the forensics this guy did. It was fascinating. Too bad it's necessary. I wonder how many machines out there are compromised without anyone even knowing it.

      1. Technically no, the spammer never got root. The spambot was sending spam as an unprivileged user (the same one that Apache ran as), which is still plenty to run a spambot.
      2. Any user can chmod files that he/she/it owns, even to deny him/her/itself access and then chmod it back.
      3. In this case, apparently not [slashdot.org], although it should be.
      4. There isn't anything built in at the command line to do it for you (at least, in any distro I'm aware of). You can kinda kludge it by reading /proc/net/dev, waiting 5 seconds, rea
  • A realistic solution (Score:4, Interesting)

    by Mostly a lurker ( 634878 ) on Tuesday December 09, 2003 @11:17PM (#7677019)
    Over 99% of discussion on elimination of spam always seems to resolve around

    * Make every stupid person smart so noone responds to spam

    * Change every mail server in the world to use a new protocol

    * Use client-side spam detection to hide spam and expect the stupid people to use it

    Well, I have less than complete faith in any of these methods providing an adequate short term solution. So, why cannot we look at the big picture?

    A few major spammers are sending millions of emails. The effect is close to being a DoS attack on the entire Internet. These emails are susceptible to pattern analysis if analyzed on a global basis. Surely what we need is somethng akin to an Internet-wide intrusion detection system. When pattern analysis indicates a spam attack, we simply block the traffic as close to the source as possible.

    Wouldn't there be a cost associated with this? Sure. But the spam problem needs to be resolved and this is the only realistic short term solution that I can envisage.

You are in a maze of little twisting passages, all different.

Working...