Azure Jane Lunatic (Azz) 🌺 (
azurelunatic) wrote2003-12-20 04:23 pm
Spammer Watch?
A friend just got some spam. The spam had her name, and the name of her place of business.
She has given out that combination of information to two places: Amazon.com and Toys in Babeland.
This does not bode well for the reputation of Santa's naughty little elves. Anyone else have info?
She has given out that combination of information to two places: Amazon.com and Toys in Babeland.
This does not bode well for the reputation of Santa's naughty little elves. Anyone else have info?

no subject
One week after an order from TiB, Bang.
*furious*
no subject
no subject
no subject
no subject
It gets about 30 spam messages per day. I swear, they just have ways of finding email addresses. And it's not a common sounding word.. in fact, it's a total made up word, so it's not like some spam company could "guess."
no subject
no subject
no subject
no subject
no subject
That's 36^8 combinations they'd have to try. That's... 2,821,109,907,456 connections to the SMTP server.
It would only be worth doing for major providers, like HotMail, and you'd have to do it through hacked machines, because as soon as HotMail notice you're trying that, they're going to block you. And they're going to notice long, long before you get to 2,821,109,907,456 attempts.
Brute-forcing usernames doesn't seem worthwhile, to me, unless you're /really/ desperate.
no subject
no subject
Plus 'minor' providers are as likely to have good security as major ones - it doesn't take much to set up useful mail logging and to skim over the logs every morning (or write a script to flag up things like this).
Brute-force methods work, but they're the last resort, since they always take the longest.
no subject
no subject
And if you only do 1-6 character names, you only have to check 321,272,406 combinations. If you can do 10,000 connections per second, and can get a response back in under one second, that's about nine hours. I'm told the spammers are using custom software that lets them do one million connections per second - which would cut that 9 hours down to about 5 minutes. At a million connections per second, the brute force for 7 & characters gets up to about 2.5 days. If they've got the cycles and bandwidth available, why not do the brute force attack? They could spread it out over whatever period of time they like.
It's another case of the connection doesn't cost them anything remotely significant - so why not do it?
Re; spammer connections
Re: Re; spammer connections
I'll bet the spammers are very careful to arrange that their software stay just below the out-of-the-box threshold for MTA's that have that feature implemented. And then have monitoring in place to alert them when they've been tossed into such a black hole, so they can back off and redefine limits.
no subject
Anyone who is running any kind of mail server with enough users to justify that kind of attack /should/ be using rate-limiting, which has practically no effect on normal usage, but cripples brute-force attacks. If you can suddenly only make /one/ connection a second (per IP), brute-force attacks are suddenly a lot less worthwhile.
Of course, there's a world of difference between 'should' and 'does', sadly.
no subject
If they have access to a class B IP range, all of the sudden rate-limiting becomes much less useful. And I would be surprised if there wasn't at least one big spammer out there who didn't have access to a class B!
Yes, the more they spread it out, the slower the brute force attack is. But they don't care - they just throw the brute force attack into their extra computes and bandwidth. It turns otherwise useless time into something that is - at least potentially - paying time.
And they spread their brute force around - at any given time, I'll bet they've got a couple of hundred (if not thousand) ISP's they can be researching.
It's an extension of the basic spam philosophy - send out a hundred thousand e-mails, get five responses, make money.
Oh - and if they have access to this technology for services other than serving up web pages, then they've got more computes and bandwidth than they'll ever know what to do with! (Title behind link - "Cloaking Device Made for Spammers")
no subject
no subject
I asked Bruce Schneier (1/2 of
no subject