Pages

Friday, April 25, 2008

My war with a Spam. Continue...


First of all, my apologies to those who bookmarked this blog. I have no time to post new articles since January, and you can blame me for that, I know...

On another note, I have something interesting to discuss. One of the Forms at RTEK 2000 web site is dedicated to those who want to order the Self-training packages (DVD or CD based tutorials for IT certifications). Recently, RTEK 2000 webmaster began receiving the messages with obvious SPAM information filled out through that form. It is nothing unusual, so the webmaster has re-designed the form adding the captcha code requirements, used Flash for coding, as well as renamed the form header but preserved the file name. After uploading a new file, to his surprise, the spam did not stop. The same information was sent over e-mail with the same form fields from the old file.

How could it be? Of course, we know that it is called e-mail spoofing, however the old Form does not exist but the spammers still use it to push the spam. Could the code in the Form be downloaded to the spammer's web site and then re-used? Possible.

I spoke to the technical support of RTEK 2000's ISP. They mentioned that the spammers could use the cached copy of the file from Google.
In fact, when the webmaster provided me with the files that you might find interesting (see below), I am kind of in doubts about cached file but inclined to believe that that copy of the code was re-used from the spammer's web site. Correct me if I am wrong.

Before you look down on the content of the files, for those who uses my list of spamming web sites and the filtering based on a provided information, I have updated the content of the file and included a bunch of additional IP addresses. Find the file here:
http://www.800-security.com/tech/SPAMaddresses.txt


=============================================
MESSAGE HEADER.

My COMMENTS: Pay attention that the IP address of the sender is 127.0.0.1. Also, I have replaced all HTTP with HTP in order not to promote the spammer. (:-)



==============
Return-path:
Envelope-to: webmaster@rtek2000.com
Delivery-date: Fri, 25 Apr 2008 04:37:06 -0600
Received: from eigzerz9 by box336.bluehost.com with local-bsmtp (Exim 4.68)
(envelope-from )
id 1JpLIf-0008NP-M4
for webmaster@rtek2000.com; Fri, 25 Apr 2008 04:37:06 -0600
X-Spam-Checker-Version: SpamAssassin 3.2.3 (2007-08-08) on box336.bluehost.com
X-Spam-Level:
X-Spam-Status: No, score=-0.6 required=5.0 tests=ALL_TRUSTED,BAYES_00,
FORGED_YAHOO_RCVD,MISSING_MID,URIBL_JP_SURBL autolearn=no version=3.2.3
Received: from localhost ([127.0.0.1] helo=box336.bluehost.com)
by box336.bluehost.com with esmtp (Exim 4.68)
(envelope-from )
id 1JpLIf-0008NE-Gf
for webmaster@rtek2000.com; Fri, 25 Apr 2008 04:37:05 -0600
Date: Fri, 25 Apr 2008 04:37:05 -0600
To: webmaster@rtek2000.com
From: 2kdcfv8m@yahoo.com
Subject: [Video Package Order Form]
X-Identified-User: {666:box336.bluehost.com:eigzerz9:800-webdesign.com} {sentby:program running on server}
Message-Id:

Below is the result of a form submission from ht tp://www.duiwashington.com/dui_washington/dui_laws/wa-house-bill-3317.html, ht tp://www.psy.uni-muenchen.de/iva/raum3225.html, ht tp://spectrum.troy.edu/wwwboard/spring2008/jrn3312.html, http://www.rtek2000.com/OrderFormVideo.html on 4/25/2008 at 4:37 AM:
---------------------------------------------------------------------------

title: Video_Package_Order_Form
print_date_in_db: 1
print_blank_fields: 1
a_name: ins01
jobposition: ins01
organization: ins01
address1: ins01
address2: ins01
city: ins01
state: ins01
zip: ins01
zip_foreign: ins01
phonenumHome: htp//home.flash.net/~hesler/dmk/_/ins01/sitemap.html
phonenumBusiness: ins01
email: 2kdcfv8m@yahoo.com
software: ins01
software_price: ins01
shipping_fee: ins01
total_price: ins01
certify: ins01
comments: htp//adigital.pntic.mec.es/~castello/images/trans/ins05/98.html afflac.com [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/98.html] afflac.com [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/97.html geic0 [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/97.html] geic0 [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/96.html esursance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/96.html] esursance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/94.html wawanesa auto insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/94.html] wawanesa auto insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/95.html geico.ocm [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/95.html] geico.ocm [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/93.html stae farm [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/93.html] stae farm [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/92.html progreessive insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/92.html] progreessive insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/90.html giecoautoinsurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/90.html] giecoautoinsurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/91.html cheap health insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/91.html] cheap health insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/89.html cigna health insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/89.html] cigna health insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/88.html wawanessa [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/88.html] wawanessa [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/87.html guardian dental insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/87.html] guardian dental insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/86.html etna insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/86.html] etna insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/85.html auto ins quotes [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/85.html] auto ins quotes [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/84.html progresssive.com [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/84.html] progresssive.com [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/83.html allsatate [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/83.html] allsatate [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/82.html ww.aiginsurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/82.html] ww.aiginsurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/81.html progressive.vom [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/81.html] progressive.vom [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/79.html progreesive [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/79.html] progreesive [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/80.html geicoinsurance.com [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/80.html] geicoinsurance.com [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/78.html progresive insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/78.html] progresive insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/77.html ww.progressive.vom [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/77.html] ww.progressive.vom [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/76.html esurrance.com [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/76.html] esurrance.com [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/75.html aflac insurance quotes [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/75.html] aflac insurance quotes [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/74.html alstate [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/74.html] alstate [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/73.html primerica insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/73.html] primerica insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/72.html progressive.c0m [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/72.html] progressive.c0m [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/71.html home insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/71.html] home insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/70.html statfarm [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/70.html] statfarm [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/69.html assurion [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/69.html] assurion [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/68.html arrp insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/68.html] arrp insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/67.html giecocarinsurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/67.html] giecocarinsurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/65.html atena insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/65.html] atena insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/66.html atnea [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/66.html] atnea [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/64.html geicio [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/64.html] geicio [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/62.html proggressive [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/62.html] proggressive [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/63.html alstate insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/63.html] alstate insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/61.html infinity auto insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/61.html] infinity auto insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/60.html gieco insurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/60.html] gieco insurance [/url] htp//adigital.pntic.mec.es/~castello/images/trans/ins05/59.html eshurance [url=htp//adigital.pntic.mec.es/~castello/images/trans/ins05/59.html] eshurance [/url] htp//ww.bklwebdesign.com/ life insurance [url=htp//ww.bklwebdesign.com/] life insurance [/url] htp://seaba.net/ car insurance [url=htp://seaba.net/] car insurance [/url] htp://homeschoolrunner.com/ home insurance [url=htp://homeschoolrunner.com/] home insurance [/url] htp://delyart.com/ life insurance [url=htp://delyart.com/] life insurance [/url] htp://ww.americasauto-mart.com/ auto insurance [url=htp://ww.americasauto-mart.com/] auto insurance [/url] htp//ww.casino-observer.info/ online casino [url=htp://ww.casino-observer.info/] online casino [/url] htp://ww.insurance-focus.net/ insurance [url=htp//ww.insurance-focus.net/] insurance [/url] htp//ww.urlcorrector.net/ urlcorrector [url=htp//ww.urlcorrector.net/] urlcorrector [/url] htp://ww.freeblackjackcash.com/ blackjack [url=htp//ww.freeblackjackcash.com/] blackjack [/url] htp//ww.dating-sc.info/ dating [url=htp://ww.dating-sc.info/] dating [/url] htp//ww.jewelrytrio.com/ online casino [url=htp://ww.jewelrytrio.com/] online casino [/url] htp//ww.alemanyboysbasketball.com/ online casino [url=htp://ww.alemanyboysbasketball.com/] online casino [/url] htp://ww.jeffmoe.com/ credit cards [url=htp://ww.jeffmoe.com/] credit cards [/url] 3pZkFg0rsp
want_to_learn:
submit_button: Submit Request---------------------------------------------------------------------------

MESSAGE ITSELF:
--------------------
Date: Thu, 24 Apr 2008 05:22:20 -0600 [05:22:20 AM MDT]
From: b1zdn7g6@yahoo.com
To: webmaster@rtek2000.com
Subject: [Video Package Order Form]
Headers: Show All Headers

Below is the result of a form submission from htp//kagura77.blog99.fc2.com/blog-entry-717.html, htp//wanwanlapper.seesaa.net/article/91148882.html, htp//www.sarahloulingerie.com/speed-queen-p-1394.html, htp//kullwee.blog67.fc2.com/blog-entry-1393.html, htp//tak-to.com/archives/401, htp//kullwee.blog67.fc2.com/blog-entry-1392.html, htp//tearoombergamot.blog55.fc2.com/blog-entry-1383.html, htp//77.66.192.239/forum/238/1-10/, htp//tomishu.justblog.jp/blog/2008/04/post-3589.html, htp//color01.blog22.fc2.com/blog-entry-1.html, htp//color01.blog22.fc2.com/blog-entry-2.html, htp//voyage2.blog62.fc2.com/blog-entry-33.html, htp//voyage2.blog62.fc2.com/blog-entry-34.html, htp//www.laosver.gr/about/mailpage.php?NEWS_ID=2662, htp//www.laosver.gr/about/mailpage.php?NEWS_ID=2662, htp//www.digitalgiftstore.com/returnform.html, htp//www.rtek2000.com/OrderFormVideo.html on 4/24/2008 at 5:22 AM:
---------------------------------------------------------------------------

title: Video_Package_Order_Form
print_date_in_db: 1
print_blank_fields: 1
a_name: online casino
jobposition: online casino
organization: online casino
address1: online casino
address2: online casino
city: online casino
state: online casino
zip: online casino
zip_foreign: online casino
phonenumHome: htp//www.carolinaflashlights.com/
phonenumBusiness: online casino
email: b1zdn7g6@yahoo.com
software: online casino
software_price: online casino
shipping_fee: online casino
total_price: online casino
certify: online casino
comments: htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/199.html zurich insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/199.html] zurich insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/198.html zurich car insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/198.html] zurich car insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/197.html www.principalinsurance.com [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/197.html] www.principalinsurance.com [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/196.html www.mypetinsurance.com [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/196.html] www.mypetinsurance.com [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/195.html wawanesa car insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/195.html] wawanesa car insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/194.html wawanesa auto insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/194.html] wawanesa auto insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/193.html village auto insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/193.html] village auto insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/192.html valley forge life insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/192.html] valley forge life insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/191.html usaa insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/191.html] usaa insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/190.html unum life insurance company [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/190.html] unum life insurance company [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/189.html united health care insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/189.html] united health care insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/188.html united automobile insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/188.html] united automobile insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/187.html unicare health insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/187.html] unicare health insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/186.html unemployment insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/186.html] unemployment insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/185.html travelers insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/185.html] travelers insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/184.html travelers car insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/184.html] travelers car insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/183.html travel insurance uk [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/183.html] travel insurance uk [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/182.html travel insurance quote [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/182.html] travel insurance quote [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/181.html transamerica occidental life insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/181.html] transamerica occidental life insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/180.html the hartford insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/180.html] the hartford insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/179.html the guardian life insurance company of america [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/179.html] the guardian life insurance company of america [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/178.html texas department of insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/178.html] texas department of insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/177.html td auto insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/177.html] td auto insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/176.html statefarminsurance.com [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/176.html] statefarminsurance.com [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/175.html state farm insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/175.html] state farm insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/174.html state farm insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/174.html] state farm insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/173.html state farm car insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/173.html] state farm car insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/172.html standard life insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/172.html] standard life insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/171.html stae farm auto insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/171.html] stae farm auto insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/170.html spectara insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/170.html] spectara insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/169.html slade smiley title insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/169.html] slade smiley title insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/168.html site:www.infinityauto.com infinity auto insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/168.html] site:www.infinityauto.com infinity auto insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/167.html site:www.edd.ca.gov california involuntary unemployment insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/167.html] site:www.edd.ca.gov california involuntary unemployment insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/166.html sedgewick insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/166.html] sedgewick insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/165.html second to die life insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/165.html] second to die life insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/164.html safeway auto insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/164.html] safeway auto insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/163.html renters insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/163.html] renters insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/162.html reliastar life insurance company [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/162.html] reliastar life insurance company [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/161.html reliastar life insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/161.html] reliastar life insurance [/url] htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/160.html reliance standard life insurance [url=htp//www-utenti.dsc.unibo.it/~leonardi/dottorato/_notes/_/ins01/160.html] reliance standard life insurance [/url] htp//www.bklwebdesign.com/ life insurance [url=htp//www.bklwebdesign.com/] life insurance [/url] htp//seaba.net/ car insurance [url=htp//seaba.net/] car insurance [/url] htp//homeschoolrunner.com/ home insurance [url=htp//homeschoolrunner.com/] home insurance [/url] htp//delyart.com/ life insurance [url=htp//delyart.com/] life insurance [/url] htp//www.americasauto-mart.com/ auto insurance [url=htp//www.americasauto-mart.com/] auto insurance [/url] htp//www.casino-observer.info/ online casino [url=htp//www.casino-observer.info/] online casino [/url] htp//www.insurance-focus.net/ insurance [url=htp//www.insurance-focus.net/] insurance [/url] htp//www.urlcorrector.net/ urlcorrector [url=htp//www.urlcorrector.net/] urlcorrector [/url] htp//www.freeblackjackcash.com/ blackjack [url=htp//www.freeblackjackcash.com/] blackjack [/url] htp//www.dating-sc.info/ dating [url=htp//www.dating-sc.info/] dating [/url] htp//www.jewelrytrio.com/ online casino [url=htp//www.jewelrytrio.com/] online casino [/url] htp//www.alemanyboysbasketball.com/ online casino [url=htp//www.alemanyboysbasketball.com/] online casino [/url] htp//www.jeffmoe.com/ credit cards [url=htp//www.jeffmoe.com/] credit cards [/url] 3pZkFdkf3r
want_to_learn:
submit_button: Submit Request
=================================

Ouch! 177 links!

Be aware!

Friday, January 18, 2008

Create complex passwords that are easy to remember


I just have reviewed the following article from TechRepublic:
"Help users create complex passwords that are easy to remember"
Date: January 16th, 2008
Author: Mike Mullins
While I agree with an author that adding the characters to your favorite password is a good way to straighten it, the password like L0u!$ville is not an easy thing to type and to memorize. There were numerous discussions on how to straighten the password to make it less “breakable“ by the brute force software including usage of a “new kid on the block” – image passwords.

I personally use the password system that is more bullet proof against the brute force and at the same time is easy to remember. I use the long phrases.

Well, it quite easy. Let’s say you like the password badboy99. To transform it to the long password, let’s type something like ialwaysabadboy99. The 16-character password is twice as stronger as 8-character password above. You can make it even stronger if to type: IAlwaysaBadBoy99

Some of the systems accept the space a password character, then you can type a regular phrase like this: Never Drink and Drive!99.

Isn't it better?

Saturday, December 22, 2007

Update to SPAM text file has been posted


Those of you who decided to use my technique to fight spam can download an updated text file (URL to the file is specified in the article).
I have new collected data about the spamming sites and domains. The header of a file was updated as well. Njoy

Friday, December 14, 2007

Google cleaned up its index from malware sites


Just want to share with you some good news.

Google finally made drastic step to remove the malware sites from their index. It was long overdue. Sunbelt first noticed the huge number of infected sites, and their appearance in results lists for a wide array of searches.
Microsoft and Yahoo! admitted that the malware sites is the problem need to be solved, however, they did not inform when they will follow Google's step. One more time: Google is ahead of crowd.

Wednesday, December 12, 2007

SHOULD WE BE AFRAID OF RUSSIAN HACKERS?



In accordance to IT security experts, cyber espionage will be the leading IT security threat next year. More than 120 countries utilize the Internet to carry out espionage as sophisticated, inexpensive attacks outpace porous network defenses.
http://www.itcinstitute.com/info.aspx?id=45273

Reading some of the latest reports on the Internet, I would like to add my thoughts about the global-level threats coming from Russian hackers, the one of the greatest source of malicious activity and cyber crime in the world.

First of all, let’s see what the people they are and what actually forces them to carry sophisticated attacks over the Internet.

WHO ARE THEY?
In the times of the existence of the USSR, the kids were brainwashed with the communism ideology starting from the kindergarten. “Grandpa Lenin” was the idol, the leader who “brought the Great October Revolution to all poor and working people”, who created the USSR with a mob of friends and his supporters from oversees (read: Germany). The Communist Party created the social model of the growing socialism that had to be inevitably converted to communism. I don’t need to explain what the communism means except the fact that this utopia still lives in the heads of many people.

In the condition of living under the power of Communist Party and KGB as a main suppressor of bright minds, the people get used to the way they live. The intelligence, particularly, entertained their minds by reading a lot of books, by listening the voice of the West using the transistor AM/FM radio, discussing the life and politics in the close circle of friends, and basically did not expect anything extraordinary from the every-day life. The main rule was “don’t stick your nose out” and you’ll be safe.

Young generation saw a clear path to the acceptable level of living (of course comparing to all other people in that country): get High School Diploma, get College Degree, and find the work as a regular engineer with average, low compensation, or, at least to become the factory worker. All of them knew that there is no way to make more money in that society unless you decide to break the law.

Everything was so standardized in a term of living that no one expected something extraordinary in their lives. To buy the car would take 10-15 years of hard work with above average compensation and saving of every possible ruble (Russian currency).

Time has dramatically changed the people who live in Russia these days. The money making opportunities, the food in the food stores, the clothe in the department stores, the new foreign cars on the streets, the new very rich Russians so–called "New Russians", the cost of living, and of course, the new Information Technology - everything has changed! The intelligent minds are more occupied with "how to make more money" idea than with new books in the book stores even if they don't have to get them through the network of friends anymore or exchange for other goods because they are freely available in the stores (just pay!).

The perception have changed! Now it is close to the Western's: to become rich! Those who were close to the Communist Party in the old days were able to grab the natural resources or entire fabrics/plants and became rich in very short period of time. They became the ideal for young generations: get rich quick. However, those who were ordinary people had no access to the country’s pie that already has been divided among the elite.

Current political situation in Russia does not encourage people at all. Believe or not, the life there still sucks. There is nothing worse than reasonless, apathy and useless life. The life when you have to kiss ^%$ (pardon my French) to every bureaucrat, put yourself down in a front of plumber or person from the Management office of the building where you live when you have to solve the every-day problems - is not something that you want to respect. Corruption has spread its web everywhere, and if you happen to cross the border of Russia it starts right there where the officials take unfairly large fees (or "bribe tax") for bringing the goodies – the fact of life in many sectors of the Russian economy.

This is so known fact that in order to minimize the exposure to corrupt practices the US Commercial Service recommended dealing only with large, well-known companies or publicly visible officials whenever possible. This suggestion is not a guarantee that you can avoid the corruption schemes (ex: 8 Russian banks engaged in money-laundering scheme with over $8 billion over 3 years). When the value of the goods is not in a line with the prices, the corruption occurs. Based on VeriSign data, for instance, the Russian federal government runs on a budget less than in Texas. It surely forces the public officials who are underpaid rely more on the “bribe tax” – the rule "demand vs. supply" in works.

Russia has always been a country that supports personified power and the term "democracy" sounds like foreign word. Russia has constructed a neo-Soviet cult of personality around increasingly clamorous figure of Putin. Putin is in the last year of his two-term serving as a President with no constitutional right to run for a third term. But the Kremlin propaganda constantly reminding Russians that their destiny is based on Putin’s longevity. It’s a known fact that Putin is a former KGB officer... Nobody knows which job Putin is going to take after the 2 terms, but everyone understands that he does not want to give the power away.

The paradox is that people support Putin but they despise his government placing Putin in their minds above corruption. It can be contributed to the fact that in spite of real challenges, the Russian government made some improvements by increasing employment opportunities and stability and decreasing the chaos of 1990s.

Putin was successful in establishing personal control over the central government. In accordance to the research by Moscow Center of Research of Elites, 78% of leading political figures (executive power and legislation) were somehow connected with the former KGB or currently restructured and named FSB during their careers. No wonder that many civil rights slowly but surely are suppressed not only for Russian citizens but also for some of the foreign journalists and actors. The assassinations are not the rare occasions…

There is still a lot of propaganda but now against Georgia, against Ukraine, and against America (do they want to steal our oil?) in addition to a state of fear. Who do they afraid of? Putin, bandits, court, management, or unavoidable crisis? It’s hard to determine. People don’t know but they are paralyzed, are faceless and motionless, and already trying to kiss %^& deeper, to lie harder, to scream louder at those who are lower on the social ladder, and to restrict more if they have any power. The main principle of soviet line [in the department store] came back: hate everyone who is staying ahead of you and despise everyone who is behind you.

The fact is that "mother Russia" is a bad mother that doesn’t love her children. This continuous fear and feeling the lack of own rights – is a life condition of kids that were lacking the love. The kids with not enough love are terrible force.

Horrible...

WHAT THEY DO TO SURVIVE
Russians always "bended heads" in a front of the Western society for their language (recall Tsar Peter and French language that was incorporated into the Russian elite society or hundreds of English technical and non-technical words that are being used today even if most of them can be directly translated in Russian because it's cool to insert them into the phrases), for music (Beatles, Rolling Stones, or even rap that was replicated by the low-class Russian musicians), for jeans (black market with Russian "fartsovschiks" who sold them under the table in 80-ties and 90-ties), and for their fashion and food.

Now, the replication spread to a computer field. Russians quickly adopted Information Technology and became quite sophisticated in many areas of computing. The computers were bought using legal and illegal ways when it was necessary, especially when the supercomputers were needed.

In order to survive and eventually live better, many Russians are looking for ways to make money. Some of them are building new businesses to serve the inside population (food or household service); the others build the connections across the border and import or export the goods or materials. If you have the business skills and connections it's a right way to go. But if you have no business skills or business talent? Maybe to find the job in some existing business as an employee? Join one of the thousands mafia groups? Learn something valuable in order to be in demand, but what? Tough choices.

I happened to talk to one young Russian fellow who came over to make some bucks in the US and was working as a life guard at the pool. On my question why he does not want to work in Russia, he mentioned that his father is a poor man with poor health, and there is no one who can help the family. There are no jobs available unless you have the car and you can speak/read English, so he is trying to find the way to make more money here and legally or illegally stay in U.S. so he'll be able to send some money to the family. I am sure you could meet some young Russians working in our department stores and in the resorts across the US coast. They are the folks who want to earn some money here, in the US, and like the described above fellow either hide and work for cash or get the chance to become a legal immigrant. You can also find them in almost every European country from England to Italy (including Sicily's smallest cities). Amazing...

What if you are an educated man with no business skills and no capital? What would you do? To become a bandit does not sound attractive; to work as an employee does not bring desired compensation and it is a long-long way to the desired level of prosperity. Some of them choose this way but are not happy. No wonder, you rarely see the smile on their faces. It takes years for former Russian immigrants who moved to the US to remove the fear, life dissatisfaction, cynicism, and anger from their faces.

Russia always was reach on smart and talented people. Let's take for instance the Russian scientists who created the space crafts and rockets, or take the artists, writers, or Russian programmers who are now working for many U.S. corporations being already U.S. citizens or still are working across the border (by the way, one of the best anti-virus program, Kaspersky Anti-Virus or popular WebCEO search engine optimization program are the creation of Russian programmers). In fact, the Russian firms exported $2 billion in software with expected 80% growth in foreign sales (in accordance to OSPINT.com).

Because of excellent school education in spite of all described above problems, there are thousands of talented computer enthusiasts who want to use their computer skills to make decent money. They are the greatest Russia's asset for future IT growth. Many of them organize the business offering their programming skills to foreign companies for pennies. Those who are well established and have a number of clients slowly raise their fees. In accordance to the latest figures, there are about 30,000 Russians who are engaged in the Information technology (with a 40% yearly growth). At the same time, the average monthly compensation of Russian programmers is around $650 dollars what is about 15-20% less than in the US.

Keep in mind that the Russian educational system graduates more than 100,000 new programmers each year! This surplus is partially utilized by the foreign companies such as IBM, Google, Microsoft, and Cisco. They built the labs and development centers in Russia. The others programmers choose one of the attractive ways to become rich quickly: to rob the foreign banks or sell valuable information to clients. Is it legal? No. Do I care? No! With unstable banking, legal, infrastructure, and government system; with anger or hate; with total corruption at every level of a society, with a life that sucks, they have no remorse. The sick society builds monsters like Russian Business Network (RBN), widely known for being a willing Internet host for spammers, malware-filled Web sites, and pornography because of its loose policies and willingness to host any Web site operator with no questions asked.

I heard that RBN has disappeared from Russian cyberspace and re-appeared in China recently, only to disappear again. RBN, until recently based in St. Petersburg, Russia, was known as the ISP of choice for cyber criminals. The group closed its Russian operation after its upstream ISP cut off the access to the group. There are some speculations that that group spread out but continues its operations. Who would refuse to make big bucks? Cyber-crime is a big business worth millions of dollars, and a business operation as large as RBN would likely not give up that easily. The analysis shows that there has been very little change in operations. Alexa statistics for Antivirgear - the bogus program, shows that the rankings have actually improved over the last month—indicating that the RBN’s activities are still going strong.

GLOBAL THREAT COMES FROM RUSSIA
As a recent Wall Street Journal article noted, cyber-criminals are exploiting Google searches and social networks – with their myriad sources of personal data – to dig for information about upper-level corporate personnel. Using that information to deliver ever-more believable email solicitations, these criminals are taking direct assault via "phishing" at corporate proprietary information stored on the desktop.

Russia has been and remains today the single greatest source of malicious cyber activity and cyber crime (possibly with the exception of the US). In many ways, Russia’s geography, and social and economic conditions (as you see above) create the perfect ground for cyber criminals. They can find the prestige in addition to money in poorly secured western companies and unprotected individuals. Because even law enforcement is often challenged with corruption, it’s hard to expect that the law in Russia will be enforced once the western company presented the claim supported by the facts and necessary evidence.

All this was contributed to the creation of a highly sophisticated cyber underground network with its own community, newsletters, blogs, and its own moral. Taking into account millions of poor people who are struggling making payments, with lack of food and clothing, and often begging on the streets and in the subways of big cities, this network is like a country within a country. Having less pressure from the law enforcement comparing to hackers in other countries, Russian hackers enjoy the freedom of doing whatever they decided to do.

How much they can make? It's hard to estimate, but I was able to find the article with short information about "the infamous 76service.com, which was run by two enterprising criminals who call themselves 76 and Exoric. The two cleared a cool one million dollars per month in a scheme modeled after portfolio investments". They sold access to infected PCs (think bots) what they called a 'project.' The buyer would harvest any valuable data off the machine, and sell that information to the black market. The buyer acts as a fund manager, and as some stocks perform well, some infected machines had more valuable booty -- such as bank account information -- than others. They could then sell it on the black market for a lot of money".
Needless to say, this example is shocking. No wonder, cyber crime with a profit is so popular among hackers. Forget about "innocent" teenagers who hacked your PC or server and placed some stupid message on the first web page or screen saver. It's all about money!

It's hard to separate the politics from cyber crime in Russia. I have to return back to the political situation inside and outside of Russia, and particularly, US.

As you probably know, the former USSR had 15 Republics, and after the collapse of the Soviet Union, the Republics got separated from Russia in order to become separate countries. Some of them were able to get rid of Russian influence, and joined the West (particularly, Baltic republics that joined NATO); others are still under heavy Russian influence with a various degree.

Due to the large population of native Russians in many of those countries, they are under pressure from Putin who used various vehicles to apply the pressure, for instance, restricting the sale of wine from particular regions (Georgia and Moldova), interfering with elections (Ukraine, where even the hackers were used to break the Central Election Commission’s servers), and placing the military bases at the territories of neighboring countries. It is not hard to understand why Russia wants to preserve the influence or presence taking into account that many former Republics have the natural resources that were used during the USSR era or have strategic geographic locations.

The relations between Russia and the US have become somewhat tense last years. Along with the collapse of the Soviet empire, many neighboring countries also wanted to loose the ties with Russia as being formerly dominated by Russia areas. Therefore, NATO expansion and US military bases in that region along the borders are not pleasant things for Putin.

There is no doubt in my mind that Russian government of FSB are eager to use the expertise of local hackers to test the ability to disrupt the communications or infrastructure of those countries that may be considered as "definitely, not the friends" if not to say enemies. In fact, in recent years, the Russian government allocated significant funding for IT-related projects and initiatives.

As I mentioned earlier in my blog, Estonia experienced distributed denial-of-service (DDoS) attacks on government, news and bank servers for several weeks. The incidents followed the removal of a Soviet statue from a central Tallinn Square. It was discovered that around 20,000 networks of compromised computers from the US, Canada, Brazil, Vietnam and others were linked.

Mikhel Tammet, director of the Estonian communication and information technology department mentioned: "It was a political campaign induced by the Russians; a political campaign designed to destroy our security and destroy our society. The attacks had hierarchy and co-ordination." Estonia is one of the Baltic countries that got separated from the Russia and became an independent, West-oriented country.

Experts believe recent attacks have been far more sophisticated in their nature, designed specifically to slip under the radar of the governmental systems they were targeting. They have progressed from initial curiosity probes to well-funded and well-organized operations for significant political or economic gain.

Evidence suggests that governments and government-allied groups are now using the Internet for espionage and cyber attacks on the critical national infrastructure (financial markets, utility providers, air traffic control) of other countries. There were more reported cases in 2007 than any previous year. This growing threat is acknowledged by the United States Department of Defense.

As the number of security holes is growing every year, the number of hacking attempts is growing, too. In accordance to Secunia Advisories, the number of security holes have been grooving at a steady rate around 25% a year:
• 2003: 2,700 advisories published
• 2004: 3,100 advisories published
• 2005: 4,600 advisories published
• 2006: 5,300 advisories published

Do you see the trend? Then more we protect our operating systems, networks, and applications then more we meet new challenges. Therefore, security now accounts for 20 percent of IT technology and training budget, according to new survey. "It is clear that information security is an increasing concern for many organizations -- 78 percent of those surveyed by CompTIA indicate that management now considers information security a top priority," the report says.

The successful attacks mean weak defense. Weak defense means poor skills of the majority of the security consultants. The director of one of the largest security consulting firms in Washington painted the picture most harshly telling a group of policy makers, "80 percent of our security consultants have soft skills and only twenty percent have hard skills. If we don't reverse that ratio within the next two years, we'll be out of business."

You may see the surprising things happened these days. The Chief Information Security Officers of the large federal agencies and corporations are being registered to attend Hacker Exploits classes. It surely demonstrates that the security field has reached a triggering point.

You could read numerous articles about credit card theft. In fact, the most successful thieves were Russian hackers. With well established networks of credit card sellers and buyers, with the sophisticated technique and attack tools, the Russian groups such as Web Attacker, Snatch, Rock Phish, and MetaFisher have been successful in their efforts. In spite of some efforts and partial success of Russian law enforcement, the network and the market still exist.

When the whole scheme was analyzed, the law enforcement officials discovered a high level of sophistication, organizational capacity, and constantly improved malicious code along with thousands of bots. They are so advanced that they have been thinking about preventive steps such as to mine the data inside the law enforcement agencies in various countries. In fact, the hacking groups go well beyond just credit card theft. They provide fundamental and countermeasure research on organizational structures and processes utilizing various databases and archives by basically employing the principle "knowing your enemy". They even try to plant one of the attackers into the infrastructure of the target organization in order to have more inside information. The thorough research and analysis in addition to a known method of social engineering before attacking the target is a scary trend…

* * * * *
I feel that while you are reading this blog you are thinking how to put together the opposite things like tough life in Russia with beggars on the streets and the explosion of Information Technology with growing number of sophisticated hackers inside of one country? As one of the Russian journalists wrote, "the country, full of talented, smart, and honest people becomes more stupid, more dishonest, and dishonored, and 20 years from now, people will ask again themselves like a maniac after orgy: how could I do this?"

Should we be afraid of Russian Hackers? The answer is above.

Friday, November 23, 2007

Steganos offers free desktop encryption


Safe One protects up to 2GB of sensitive data

I used some Steganos' freebies in a past but never valued them to the degree so I can recommend them. This time, I want to bring your attention to the new Steganos Safe One product, a freeware version of Steganos Safe for consumers and small businesses.

The privacy software provides protection for up to 2GB of sensitive data by creating two 1GB virtual drives which can store encrypted versions of the data.

According to the company, you can use various portable devices, such as iPod, USB sticks, digital cameras and PDAs that can be used as keys to open the Steganos "safe". The program also features a fully integrated password generator to help users produce secure passwords with a built-in multilingual dictionary.

Steganos PicPass allows users to utilize images as a personalized password by memorising their exact sequence. I have experimented with personalized images about a month ago but did not accept it for my passwords, yet. Personalized images is a new way to password protect your data.

"Steganos Safe One offers users real peace of mind, secure in the knowledge that their privacy is protected without them having to spend anything to do so. "

Steganos Safe One is now available for download. The Steganos Safe One supports Windows XP for the x64 processor architecture, and encrypts data with 256 bit AES. Not bad at all!
http://www.steganos.com/us/products/home-office/safe-one/overview/

Monday, October 22, 2007

* Certified are getting paid less!


I found a small article written by Tessa Parmenter. She noted that his week, Foote Partners LLC released a study revealing unbelievable information: the average premium pay for uncertified workers INCREASED over those who are certified. They have seen the average premium pay for uncertified workers increase 8% and decrease 2.3% for certified engineers in the past year.

http://itknowledgeexchange.techtarget.com/networkhub/you-mean-i-wont-get-paid-more-for-getting-this-cert/?track=NL-81&ad=610275&asrc=EM_USC_2423108&uid=5617007


What can I say? Certainly, there are some exclusions (CCIE, CISSP, J2EE...) but every rope has the end! Read my previous posting about certifications in details.

Friday, September 21, 2007

* "Thank You" letter for your Friday enjoyment


Thanks to my son who send me this "jewel" of a "Thank You" letter. I feel that I need to share it with you for a good Friday laugh. He interviwed the guy for a LAN Admin position. On the question what's the difference between the HUB and the SWITCH. He answered: "Hub is just a hub, and the switch it's like a car with a green and red light..." Well, below is a copy of his "Thank You" letter receved just next day over e-mail. I did not correct anything... Njoy! :-)


Dear Mr. YYYYY,

It was very enjoyable to speak with you and your team about the LAN Administrator position at Department of Labor. I think I was too nervous for some technical questions that you and you team asked me such as: how can you joint your server to the domain? The answer should be: go to command prompt then type: DCPROMO then server name. Another question you asked me what if user are not able to see your server? The correct answer should be at the logging window right click on the check box below your user ID change it to the correct server. Then what is the maximum speed of the switch? The correct answer should be 1000 Mbps. I know I get lost this morning from place to place. However, I know that I should have done a better job than what I did this morning. I also know that I am out of your consider about the job you want to hire that's fine with me. I just want to tell you that my brain was shut down this morning (I need a cup of café in the morning) those questions are within my knowledge, and I did do it well. If I have another change I would have done a lot better job.
I appreciate the time you took to interview me; I am very interested in working for you and looking for ward to hearing from you about the second Interview.

Sincerely Yours,
YYYYYY YYYY

Friday, August 10, 2007

* How to hack unencrypted wireless session


Recently, I came across the information about unsecured WiFi connections. I am sure you are familiar with this scenario when you turn your laptop on in some of the buildings or neighborhoods, and your wireless card can find at least 2-3 unsecured wireless connections. Unfortunately, most of them are the result of the default configurations of the wireless router being pre-configured by the manufacturers and used by inexperienced consumers. While I can understand why they do it this way (for non-IT customers), it leads to a wide-open gate for hackers and this is not news, what is interesting is how easily Web app sessions can be hijacked on these networks.

Infamous Robert Graham, the CEO of Errata Security (I have the links to his web site in our Information Security Index), described the “man in the middle” attack. Robert hijacked a GMail session of a volunteer and showed how easily he could grab cookies and IP addresses and take over a session.

The attack is actually quite simple. First Robert needs to be able to sniff data packets and in our case the open Wi-Fi network at the convention fulfilled that requirement.

1. To ran the “Ferret” utility to copy all the cookies flying through the air

2. To clone the cookies into a browser with a home-grown tool called “Hamster”.

3. The attack can hijack sessions in almost any cookie-based web application (ex: Google’s Gmail, Microsoft’s Hotmail and Yahoo Mail).

4. Since those programs just uses cookies, getting the IP addresses and user names and passwords are not required.

How to protect your session? Hey, just use the SSL from the beginning instead of a pure HTTP session:

https://mail.google.com/mail/ instead of the http equivalent will be a good remedy.

Tuesday, July 31, 2007

* My War with the SPAM


Spam hurts.
Spam drives us crazy.
Spam consumes resources on your web site, in your mail box, the traffic on the Internet, and a disk space on your ISP's servers.
Spam kills our precious time when we want to read the e-mails from legitimate senders but forced to read pure junk and delete the stream of offers to buy drugs, to play online casino, to work as the representative of a foreign company, to get the guaranteed cash, to catch the virus of Trojan horse program (hidden behind the text/link of image), to meet hot singles in your area, or porn crap.
How to fight SPAM?

I began with collecting the links to the informational sites that offer knowledge and resources on fighting the spam nightmare. You can find one here, too:
http://www.rtek2000.com/Tech/I-SecureLinks3.html

Reading through the numerous web pages , articles, blogs, and forums, I found that the first source of the spam to my e-mail box is my own e-mail address that can be scanned from any web site where I posted it by the e-mail harvesting programs freely available on the Internet. As far as I know, those programs were designed by the folks who did not want to spam but rather get the attention to their products. So, the simplest way to distribute the news about a particular product was to e-mail to a large number of cyber citizens. It is how the spamming started!

Now, the spamming is extended to the wide range of services, and the millions of affiliates who want to make a buck by selling the product or service need the customers who want to buy. You may ask me, how come I am getting e-mails with a garbage text in it; it's not the offer to buy anything, it's a junk! Well, thanks to the search engines (and particularly, to their "crawlers" or "spiders") that scan not only web sites pages but also the folders that contain e-mails. By sending the garbage-like text in e-mails with the keywords embedded in the text, the spammers hope to raise their web sites' popularity level through the search engine ranking. Particularly the spam that I am getting these days is about 60% of this kind.

I have seen several ways of packaging spam messages: Plain text, Image files, Document files, and lately PDF files.

So, how to protect your e-mail address from being harvested? There were numerous discussions on the web. I have participated in several of them. The common conclusion: there is no way to completely hide the e-mail address. I used to implement various JavaScript-based solutions that may protect against simple harvesting programs, however, as the countermeasures become more complicated, the "harvesters" become more sophisticated. My latest solution is to use the small image of my e-mail address being loaded thought the CSS code (cascading styles sheet method). It greatly reduces the chances to be harvested, however, it does not guarantee 100% protection because there are some programs that can use the character recognition in the image. Don't think it's done manually! Those programs do it automatically!

The biggest problem with the spammers lays in the area of blogging. If you happened to have the blog site of forum, you must clean your blogs from literally hundreds of spamming messages in every corner of your site! If you don't manage one, you are lucky because it is a real nightmare. The automated programs that specialize in breaking through the web site security rules using the weaknesses in the software design can post automated messages within seconds!
To be honest, I gave up on the forums completely by locking it up from posting but I still have to clean it up regularly (less often, at least). It is a very time-consuming task to tweak the web site's files, apply patches, or complicated solutions that in the end only temporarily protect against the stream of spam.

I have decided to concentrate on fighting the e-mail spam. The second step after getting some background on spamming was to identify the domains that are sending the spam. It is not a simple task taking into account that when the spammers send e-mails they rarely specify their real e-mail address but rather the link to their web site. The only way to find out the real sender is to look in the message header, and to grab the IP address from the top of the message. So, I have collected the IP addresses in the text file, day after day spending precious minutes for the purpose of identifying the biggest spammers in the world.

Well, I do not suggest you to repeat it. First of all, it's not the pleasant procedure. Second of all, there are many anonymizer-type of the programs that can hide your real IP address and to substitute it with a random IP address taken from the text file. The only what drives me up in my efforts is the revenge when I will be able to filter the most of the junk and redirect it to the trash can where it belongs.

After collecting the information from my e-mails, I have identified the high-level IP addresses (like 88.xxx.xxx.xxx, 89.xxx.xxx.xxx, etc). Then, using the WHOIS service, I have identified the countries that are originators of the spam e-mails. I realized that I have no customers in China, for instance, who order my products using English-based pages, so I can filter all of them out. Using similar approach, I have set the web site filters accordingly, so the domains that I have identified could not access my web sites.

You won't believe what happened. I have reduced the spam by 80% instantly!!

I felt that the victory is close but I did not expect the problem that I have faced really soon.

My sales dropped by 80%... No, it's not because I have filtered spam but (as I discovered later) because the Google's PR (page rank) of my web pages dropped from PR6 to zero. I began to investigate what happened. My guess that I have prevented the Google's spider to crawl my web site unfortunately was the correct one. The Google's spiders were in my filter-out range. It took me about two months of hard work in optimizing my web site, adding more pages, sending begging e-mails to Google until I have re-instated my position in the search engine.

Moral? Be careful when you implement the filtering!

I have changed my strategy after that and I filter only on the e-mail level, not the web site level. I have the long list of spammers (http://www.800-security.com/tech/SPAMaddresses.txt) that I am updating weekly. So, you can use it at your own discretion. Please keep in mind that the more filters I apply then the less information will be shown in the file. One quick suggestion: filter the e-mails that contain the .tr, .pl, .br, .ma, .th, .ru, .jp, .ch domains in the message header.

I am going to show which filters I used on the top of the text file soon. So, keep monitoring!

To finish my story, I want to point you to a very useful web site:
http://www.projecthoneypot.org/

See the Top 25 Countries Where Spam Servers Are Located.
I utilized a freely available technique to "honeypot" the spammers. So, now I can see how many of the "harvesters" were fooled by my program (oh, the sweet revenge!) as well as I see the updated in a real time list of the biggest spammers in the words by precise IP address. It gives me the opportunity to adjust my filters.

Am I getting the spam now? Yes. But it is 10-12 a day but not 80-120 as it used to be.

Happy fighting!