SPAM, SPAM, SPAM
Transcrição
SPAM, SPAM, SPAM
Dienstag, 8.2.2005, Restaurant Gallusplatz, St. Gallen SPAM, SPAM, SPAM, ... Prof. Dr. P. Heinzmann, ITA-HSR / cnlab AG, Tiefenaustrasse 2, CH-8640 Rapperswil e-mail: [email protected] url: www.cnlab.ch cnlab / HSR 2/21/2005 1 E-Mail ist neben World Wide Web (WWW) die gegenwärtig wichtigste InternetAnwendung. Allerdings wird bei vielen Leuten die "Kommunikationsfreude" durch eine Flut von unerwünschten Mails - so genannten SPAM Mails - getrübt. Im Rahmen dieser Veranstaltung gehen wir folgenden SPAM-Fragen nach: - Was ist wirklich SPAM? - Wieso kennen plötzlich alle meine e-Mail-Adresse? - Was haben Viren und Würmer mit SPAM zu tun? - Wie kann ich mich gegen SPAM wehren? Im Rahmen des Vortrags sollen die Teilnehmenden vertiefte Kenntnisse zum Thema eMail/SPAM erlangen und entscheiden können, wie sie sich künftig gegen die SPAM-Flut wehren sollen. Referenzen: •Mike Spykerman, “Typical spam characteristics - How to effectively block spam and junk mail”, White Paper, Red Earth Software. •E-Mail Spamming countermeasures: http://ciac.llnl.gov/ciac/bulletins/i-005c.shtml •Howto gegen Schweizer SPAM: http://spam.trash.net/ •Michael Heuberger, “Spamming – Spamming the Internet”, Hochschule Rapperswil, ISeminar SS 2001, Release 25.4.2001. •Matthias Rambold, “Wie wird SPAM bekämpft?”, Hochschule Rapperswil, I-Seminar WS 2001/02. 1 Cnlab Information Technology Research AG und Hochschule für Technik Rapperswil (HSR) www.cnlab.ch ita.hsr.ch HSR: • Gegründet 1997 • HSR spin-off • 10 Mitarbeiter • Internet Security • Performance-Testing • Spezialanwendungen cnlab / HSR 2/21/2005 ITA: Teilschule der Fachhochschule Ostschweiz 1‘000 Studierende, 6 Abteilungen (Informatik, Elektrotechnik, Bauingenieurwesen, Maschinenbau, Siedlungsplanung, Gartenarchitektur) Kompetenzzentrum für InternetTechnologien und -Anwendungen 2 2 Einleitung: Wie komme ich an meine TourLive-Kunden cnlab / HSR 2/21/2005 3 3 cnlab TourLive-Mobile System • Positions-, Geschwindigkeitsund Bildinformationen von bewegten Objekten – Sportler (Radfahrer/Biker, Wanderer, Langläufer, InlineSkater, …) – Personal (Securitas) – Personen (Kinder) • Online-Verfolgung – Alarmierung bei Unfällen – Event-Informationssystem • Offline-Verfolgung – Trainingsdatenanalyse • Alternative Art zu Fotografieren cnlab / HSR 2/21/2005 4 4 Internet: the Net of Nets 194.95.208.10 195.65.129.44 www.polizei.bayern.de pc4.cnlab.ch cnlab.ch switch.ch polizei.bayern.de Router greenpeace.org 199.249.19.231 www.mci.com hsr.ch cnlab / HSR 2/21/2005 152.96.129.3 mci.com sky.hsr.ch 5 Das Internet ist ein Netz von Netzen. Die einzelnen Teilnetze - auch Domains genannt – erhalten einen weltweit eindeutigen Namen (z.B. hsr.ch). Die Datenübertragung im Internet erfolgt „paketweise“. (Man spricht von „Paketvermittlung“.) Jedes Datenpaket enthält die Internet Protocol (IP) Adresse der Destination und des Absenders, d.h. jedem via Internet ansprechbaren Rechner muss eine (weltweit) eindeutige IP-Adresse zugewiesen werden. Die eigene IP-Adresse kann man sich im DOSFenser(„Eingabeaufforderung) mit dem Befehl ipconfig anzeigen lassen. Die IP-Adresse, unter welcher man beispielsweise bei einem Web-Server bekannt ist, kann man sich auf www.whatismyip.com darstellen lassen. Ein Teil der IP-Adresse (z.B. 195.65.129.0) bezeichnet das Teilnetz, der andere Teil bzw. die gesamte Adresse identifiziert einen bestimmten Rechner im entsprechenden Teilnetz (z.B. 195.65.129.44). Einen Rechnern kann man anstatt über die IP-Adresse (z.B. 199.249.19.231) auch über den Domain-Namen (z.B. www.mci.com) ansprechen. Die Zuordnung von Domain-Namen zu IP-Adresse erfolgt über das „Domain Name System (DNS)“. Weitere Informationen zur Domain-NamenZuordnung und zu den Inhabern von Domains findet man bei www.switch.ch. 5 Internet «Killer» Applications • E-Mail • Web • Suchmaschinen 2004: Mehr als die Hälfte der Schweizer Bevölkerung (51,2%) nutzt das Internet täglich oder mehrmals pro Woche. (www.wemf.ch) Ref: Nick Hösli, Baromedia 2001, Ringier AG, www.webdo.ch cnlab / HSR 2/21/2005 6 http://www.webdo.ch/downloads/baro2001_d.pdf http://www.wemf.ch/d/studien/manet.shtml 2004: 3,8 Millionen Personen das Internet. Dies entspricht 66,7% der Bevölkerung ab 14 Jahren. Mehr als die Hälfte der Schweizer Bevölkerung (51,2%) nutzt das Internet täglich oder mehrmals pro Woche. 6 Spezielle Suchmaschinen: E-Mail Harvester www.mailutilities.com 1. Phase: Web-Seiten mit Suchbegriffen finden Weiteren Links folgen 2. Phase: e-Mail Adressen auf Web-Seiten Suchen cnlab / HSR 2/21/2005 7 http://www.contactplus.com/products/email/etour/hrvemail.htm http://www.5star-shareware.com/Internet/Email-Tools/perfectharvester.html 330+ search engines from 36 countries two HTML parsers — Microsoft parser and built-in parser scripting technology to process found emails on fly very flexible plugins technology flexible limiters of scanning range command line mode to automize 7 Was ist SPAM? cnlab / HSR 2/21/2005 8 8 SPAM History • 1937: Hormel & Co. economical pork loaf called SPAM – government did not allow to call it ham) – advertising campaign for "Spamwich" or "Spambled eggs" • • 1970: Monty Python's Flying Circus Wikingersketch (SPAM) 1994: Laurence Canter and Martha Siegel made a newsgroup posting about a „Green Card Lottery“ – SPAM used for messages to flood newsgroups with irrelevant or inappropriate messages • 2002: eMail SPAM is getting a significant Internet problem cnlab / HSR 2/21/2005 9 •1937 US company Hormel Trademark: During the Great Depression, George A. Hormel 's (1860-1946) company sold 1.5-pound cans of beef stew for only 15 cents, providing an affordable, filling, and nutritious meal for the families of unemployed workers. The beef stew and other "poor man's dishes" (including canned products such as corned beef and cabbage, spaghetti and meat balls, and chili con carne) were highly regarded in those lean years. "Encouraged by the success of its poor man's dishes, Hormel & Co. introduced an economical pork loaf in 1937. The canned meat ran into a major problem before it even got to market, however, when the U.S. government would not allow the company to call it ham, because it was made from pork shoulder instead of the hindquarters.” http://www.roadsideamerica.com/attract/MNAUSspam.html The product was called SPAM instead ov Ham (as an Abbrevation for „Spiced Pork and Ham“) •November 1970 there was a Monty Python's sketch on SPAM in a cafe. One table is occupied by a group of Vikings with horned helmets on. A man and his wife enter. Whenever they hear the word “Spam” everybody is repeating and singing “Spam, Spam, …”. http://www.cs.berkeley.edu/~ddgarcia/spam.html#MontyPython •April 13, 1994 there was a lowers couple, Laurence Canter and Martha Siegel, who used the Usenet to send out an advertisement about their (overpriced) immigration help service. They made an announcement, that people could win “Green Cards” by sending a postcard to the “Green Card lottery service” and at the same time they advertised their (overpriced) services to immigrant communities. This created a big, endless discussion about advertising in Usenet news groups. http://www.wired.com/news/politics/0,1283,19098,00.html •Around 2002, SPAM is really an important problem in e-mail communication. 9 Mails an cnlab Dez 04 / Jan 05 80% total Mails 75% an gültige Adressen 70% ohne Virus 65% nicht Spamassassin tagged 60% nicht Brightmail tagged 55% 50% Nur etwa 10% aller Mails sind keine (nicht erwünschte) Massenmails 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% 1 2 3 4 5 6 cnlab / HSR 2/21/2005 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 10 10 SPAM-Arten • SPAM Other; 3% Spiritual; 4% Leisure; 6% Products; 25% – Unaufgeforderte Massenmails, welche maschinell versandt wurden • UBE (Unsolicited bulk e-mail) • UCE (Unsolicited commercial e-mail) Internet; 7% – Keine (Geschäfts)Beziehung zwischen Sender und den meisten der Empfägner Health; 7% Scams; 9% Financial; 20% Adult; 19% 2003: www.spam-filter-review.toptenreviews.com/ spam-statistics.html cnlab / HSR 2/21/2005 • SPORN: SPAMs mit pornographischem Inhalt • SCAM: SPAMs mit gefälschtem/ bösartigem/ kriminellen Inhalt – Nigeria … Info Grabber (Phishing) 11 The 2003 statistics were derived from a number of different reputable sources including: Google, Brightmail, Jupiter Research, eMarketer, Gartner, MailShell, Harris Interactive, and Ferris Research. •Worst of the Spam - Sporn - How well does the email filter support the blocking of sporn or spammed pornography? Does it allow you to block all pornography and/or adult themes? Does it allow you to view quarantined email without viewing any of the pornographic i? •As much as 8% of all e-mail is pornographic in nature, what we at Spam Filter Review call “Sporn” or spammed pornography. http://www.spam-filter-review.toptenreviews.com/spam-statistics.html 11 "419" Scam (Advance Fee Scam) http://www.joewein.de/sw/419scam.htm • Nigeria or West African Scam – – – – • large sum of money sitting in a bank account making payments through you to us At some point, the victim is asked to pay up front an Advance Fee of some sort http://home.rica.net/alphae/419coal/ Fake Lottery Scam (Elgordo Lottery Madrid, Microsoft Email Lottery) – you have therefore been approved for a lump sum pay out of US$ 500,000.00 – To file for your claim, please contact … • Ghana Gold Scam – prepared to provide quantities of up to 400 kilograms of 22.karat alluvial gold monthly – offer the quantity of gold required to the Buyer [or their representative] upon their arrival here in Accra – kindly contact me at the numbers listed above cnlab / HSR 2/21/2005 12 The so-called "419" scam (aka "Nigeria scam" or "West African" scam) is a type of fraud named after an article of the Nigerian legal code under which it is prosecuted. Most "normal" spam uses bogus sender addresses. For 419 spam existing mailboxes at legitimate mail providers are used. When such mailboxes get cancelled for abuse, often similarly names mailboxes are created at the same provider. Most 419 scams originate from about a dozen freemailer domains (netscape.net, yahoo.com/yahoo.*, tiscali.co.uk, libero.it, telstra.com, bigpond.com, indiatimes.com, 123.com (Chile), zwallet.com, fsmail.net, hotmail.com, etc., see addresses by domain). A small minority uses throw-away domains registered via MSN (see example), Rediffmail, XO/Concentric, Yahoo/Geocities or other webhosters (ns.signon-africa1.net) as the sender instead of a freemailer service, particularly for fake companies and fake banks (e.g. firstcapitalft.com). http://home.rica.net/alphae/419coal/ http://www.joewein.de/sw/419scam.htm 12 Info Grabber: Cheap Rolex? cnlab / HSR 2/21/2005 13 Lockvogelangebote für Rolex-Uhren, Windows Software, Wettbewerbe, … Gefälschte Bestellung, mit falscher MC Nummer und Junk e-Mail am 17.11.04 abgeschickt: •Keine Verschlüsselung •Falsche Kreditkartennummer nicht detektiert •Keine E-Mail-Bestätigung für die Bestellung … wahrscheinlich geht es nur darum, Kreditkarten- und Personen Informatinen zu sammeln. http://www.onlinereplicastore.com/checkout.php 13 Phishing Real site 3. Spoofed Web Site 1. Spoof E-Mail (Spam) 2. Camouflaged Hyperlink Fake Pop-Up <A HREF=www.stealmyinfo.com>www.yourbank.com/myaccount</A> cnlab / HSR Ref. Gartner Group, Cannes 2004 Phishing is a spam-based scam that has grown in popularity. Phishing is not a "cyberattack," such as propagating malicious code. It is a social-engineering attack, in which attackers (or "phishers") trick users into doing something that will harm them or their companies. The phisher sends an e-mail message that looks like it comes from a legitimate source — for example, an online merchant. In many cases, the message states that there is a problem with the user's account and requests that the user confirm the merchant's information by entering sensitive account information (such as a credit card number, address, user name and password) into the phisher's Web site, which resembles the merchant's site. Using this information, the phisher can steal access to the account or perpetrate identity fraud. In addition, phishing could provide attackers with access to an organization's internal systems, but it is used for identity theft in most cases. 14 SPAM-Kosten Kalkulator 15 cnlab / HSR 2/21/2005 Finden Sie heraus wie sich Spam auf die Finanzen und Produktivität Ihrer Unternehmung auswirkt. Füllen Sie Felder 1-5 mit den entsprechenden Zahlen und clicken sie auf 'Spamkosten Berechnen'. Diese Kalkulation ist nur eine Schätzung und bezieht keine Kosten ein, welche durch verschwendeten Speicherplatz, Bandbreite und IT Personal entstehen. http://www.open.ch/de/services/spamcalc.html Durch Spamming fallen Kosten an. Mehrheitlich werden diese nicht vom Spammer bezahlt: Download der Nachrichten Unnötiger Verbrauch von Festplattenplatz Unnötiger Traffic auf Netzwerkressourcen SPAM auf falsche Adressen: Fehlermeldungen kommen zum ISP Wenn Spammer fremde Mail-Server für ihre Zwecke missbrauchen, können dadurch ganze Server lahmgelegt werden Geschätzte Kosten weltweit: 10 Milliarden Euro 15 Wie finde ich SPAM und Spammer? (Spam-Abwehr) cnlab / HSR 2/21/2005 16 16 Mail Format (RFC 822 standard text message format) SMTP-Envelope (written by servers) RCPT To: Mail From: • DATA header lines – – – – • To: From: Subject: … body – the “message”, ASCII characters only header blank line body cnlab / HSR 2/21/2005 17 Die Header-Informationen werden beim normalen e-Mail Client vom ClientProgramm an den SMTP Prozess übergeben. D.h. beim Versand einer normalen E-Mail werden die Adressen, die im Mailprogramm des Absenders in die Felder "To:" und "CC:" eingetragen wurden, nicht nur zur Generierung dieser beiden Headerzeilen benutzt, sondern auch beim SMTP-Dialog als "RCPT TO:" und „Mail From:“ auf den Umschlag übertragen. Die Envelope enthält die für die Zustellung einer E-Mail relevanten Informationen, welche vor allem durch die MailServer interpretiert werden. Dem Client interessieren die Envelope-Informationen in der Regel nicht. Allerdings werden manchmal gewisse Daten aus der Envelope in den Header übertragen. http://sites.inka.de/ancalagon/faq/headerfaq.php3#Section_2.1 17 E-Mail Versand, Weiterleitung und Empfang (SMTP = Simple Mail Transfer Protocol, POP = Post Office Protocol) Internet [email protected] Mail Client Send Server Router [email protected] Router Router Send Server Host 1 Receive Server Router Receive Server Send Server Host 1 bbb.ch Host 1 aaa.com cnlab / HSR 2/21/2005 Router 18 18 Return-Path: <[email protected]> Received: from mx3.gmx.example ([email protected] [195.63.104.129]) by ancalagon.rhein-neckar.de (8.8.5/8.8.5) with SMTP id SAA25291 for <[email protected]>; Thu, 16 Sep 1998 17:36:20 +0200 (MET DST) Received: (qmail 1935 invoked by alias); 16 Sep 1998 15:36:06 -0000 Delivered-To: GMX delivery to [email protected] Received: (qmail 27698 invoked by uid 0); 16 Sep 1998 15:36:02 -0000 Received: from pbox.rz.rwth-aachen.example (137.226.144.252) by mx3.gmx.example with SMTP; 16 Sep 1998 15:36:02 -0000 Received: from post.rwth-aachen..example (slip-vertech.dialup.RWTH-Aachen.EXAMPLE [134.130.73.8]) by pbox.rz.rwth-aachen.example (8.9.1/8.9.0) with ESMTP id RAA28830 for <[email protected]>; Wed, 16 Sep 1998 17:35:59 +0200 Message-ID: <[email protected]> Date: Wed, 16 Sep 1998 17:33:35 +0200 From: Heinz-Gustav Hinz <[email protected]> Organization: RWTH Aachen X-Mailer: Mozilla 4.05 [de] (Win95; I) To: Karl-Heinz Schmitt <[email protected]> MIME-Version: 1.0 | Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable Subject: Re: Hallo Nachbar! References: <[email protected]> Reply-To: [email protected] X-Resent-By: Global Message Exchange <[email protected]> X-Resent-For: [email protected] | X-Resent-To: [email protected] cnlab / HSR 2/21/2005 19 •Die Return-Path Zeile sollte, wenn sie existiert, ganz am Anfang der EMail stehen. Sie enthält den Envelope-From (also die Absenderangabe aus dem SMTP-Umschlag). Diese kann allerdings bei SMTP beliebig angegeben werden. •Die "eigentlichen" Zustellvermerke sind die "Received:"-Headerzeilen, die jeweils vor dem Weiterschicken einer E-Mail vom Mailserver vorne angefügt werden. •Die oberste "Received:"- Zeile wurde vom eigenen Mailserver (bzw. dem des Providers) erzeugt. Eine "Received:"-Zeile gibt immer an, wer die Mail von wem empfangen hat. •Gewisse Received-Zeilen können je nach verwendetem Mail-Server sehr speziell aussehen (vgl. Received: (qmail ...) und Delivered-To: GMS ..., bei welchen es sich um eine Spezialität des GMX-Mailers handelt. •Die Message-ID ist eine eindeutige Kennung der E-Mail (vergleichbar einer Seriennummer). Sie sollte aus einer unverwechselbaren Zeichenfolge vor dem "@" (meistens Datum und Benutzerkennung in einer kodierten Form) und einem Rechnernamen hinter dem "@" bestehen. Häufig wird die Message-ID bereits vom Mailprogramm des Absenders erzeugt; ansonsten tragen die meisten Mailserver sie nach, soweit sie fehlt. •Alle mit "X-" beginnenden Headerzeilen sind nicht standardisiert und können von verschiedenen Programmen (oder auch Benutzern) beliebig eingefügt werden. 19 Example: Mail header additions by involved (SMTP) servers • Each SMTP engine adds his Domain Name (with IP Address) and a „Time Stamp“ to the Mail Header sky.hsr.ch (SMTP/POP Server) Received: from mail.iprolink.ch (titan.iprolink.ch [194.41.63.57] by sky.hsr.ch (8.8.6/8.8.6) with ESMTP id UAA06615 for <[email protected]>; Wed, 5 Feb 2003 20:04:55+0100 (CET) mail.iprolink.ch (SMTP Server) Received: from tslzgp157.iprolink.ch (tslzgp157.iprolink.ch [194.158.5.157] by mail.iprolink.ch (ipl/ipl) with ESMTP id UAA46506 for <[email protected]>; Wed, 5 Feb 2003 20:04:21+0100 (CET) tslzgp157.iprolink.ch (Mail Client/SMTP) Received: by tslzgp157.iprolink.ch with Microsoft Mail id <[email protected]> Wed, 5 Feb 2003 20:01:39 +0100 (CET) cnlab / HSR 2/21/2005 20 Mail from user [email protected] to [email protected] These “stamps” are placed on the envelope of the mail by each SMTP server. The SMTP/ESMTP IDs as well as the time stamp have local significance only (i.e. it is just the local time of the corresponding server). [see also http://www.stopspam.org/email/headers/headers.html] 20 SPAM-Detektion und Filterung cnlab / HSR 2/21/2005 21 21 Technische SPAM-Abwehrmassnahmen • Accept mail from local Clients only (no relaying) • Client Authentication • Delay mass mails (Teergrube) Internet Send Server Router Router Router Router Router Blacklist Spammer Receive Server • Filtering (header, content) 230.60.6.6 152.96.123.11 80.123.122.5 ... • Blacklists (do not accept certain senders) / whitelists • Make sure the sender exists (SPF, Greylisting) • Filtering (header, content, mail signature) cnlab / HSR 2/21/2005 22 Avoid e-Mail grabbing •Identify and abort dictionary attack •Identify and abort address-harvesting attack (e-mail tag handling) Boundary Defense •“Non accept” a message (simply decline to accept it, rather than receiving it at all) •Disable relaying, verify, expand Header Analysis (Reading email headers by www.stopspam.org: http://www.stopspam.org/email/headers/headers.html ) •Validity of the sender (using “reverse lookup”) •Consistency between the sender and the from fields •Tactics used by known spammers that are highly unlikely to be found in normal messages Content Analysis •A set of rules to search for known spammer tactics •A set of rules to search for known chain letters, hoaxes and urban legends •The ability to look for words and phrases in a targeted “words list” (for example, porn, financial services) •The ability to do contextual analysis •The ability to “tune” the product for the environment Sensing or Reporting •put e-mail accounts in all the places spammers love to harvest addresses (SPAM honeypot, decoy addresses) •create consortia or user groups to develop and share anti-spam rules Blacklist and White Lists •Create a blacklist of servers (and networks) which support spamming •create a white list of servers (and networks) that are always allowed to receive e-mail, no matter what the content is •URL-Blacklist 22 Mail Abuse Prevention System (MAPS) • • • • • • • MAPS RBL (Realtime Blackhole List): first list of IP addresses of known sources of unsolicited commercial and bulk email (established in 1996) MAPS DUL (Dynamic User List): list of IP addresses that should not be running mail servers MAPS RSS (Relay Spam Stopper): list of IP addresses of known insecure ("open relay") mail servers MAPS OPS (Open Proxy Stopper): list of IPs that have been used, as an open proxy, to transmit spam MAPS NML (Non-confirming Mailing List): list of IP addresses that have been demonstrated to be the sources of mailing lists, which do not fully verify the email addresses on their list Spam URI Realtime Blocklists (SURBL) http://www.surbl.org … was purchased by Kelkea, Inc. on July 1, 2004, cnlab / HSR 2/21/2005 23 The MAPS RBL is a list of hosts and networks that allow spam to originate on their system. Vendors of spam-filtering services or software develop blacklists by compiling possible spam addresses and domains through e-mail accounts in different markets. The vendor makes a decision whether the suspect e-mail constitutes spam and the address or domain should go on its blacklist. On July 1, 2004, Kelkea, Inc. purchased the assets of Mail Abuse Prevention Systems, LLC. The MAPS subscription services are now offered as part of the Kelkea Antispam Service. 23 Basic E-Mail Setup SMTP Int. Mailserver Ext. Mailserver Quarantine SPAM-Filter_2 VirusScan_2 User Unknown SPAM-Filter_1 VirusScan_1 Blacklists Delete (Trash) SMTP POP/IMAP SMTP Tag SPAM-Filter_3 VirusScan_3 Feedback cnlab / HSR 2/21/2005 Mail Client User Feedback 24 24 SpamAssassin RuleScore AB_URI_RBL Bayesian spam probability is 99 to 100% Forged hotmail.com 'Received:' header found From: contains numbers mixed in with letters Reply To: contains numbers mixed in with letters OB_URI_RBL Razor2 gives confidence between 51 and 100 Listed in Razor2 (http://razor.sf.net/) Bulk email fingerprint (double IP) found Sent via a relay in ipwhois.rfc-ignorant.org Received: contains a numeric HELO SPAMCOP_URI_RBL WS_URI_RBL 5.00 5.40 0.50 0.26 3.25 4.00 1.10 1.05 1.86 0.10 1.50 3.00 3.00 Total 30.02 cnlab / HSR 2/21/2005 25 Example from http://demo.mailcleaner.net/index.php 25 Example: Graylisting at UniNE Incoming mail vs. Spam during last 12 months GreyListing since beginning August 2004 26 cnlab / HSR 2/21/2005 Anti-SPAM methods and their efficiency as used at Uni Neuchatel: 75% less incoming mails since GreyListing (new since 8.2004) was intruduced. The remaining SPAMs are tagged as follows: •50% Spam Lookup Service (SLS/RBL/MAPS) •50% URI Realtime Blocklists (www.SURBL.org) •20% Attachement blocking (.ade .adp .bas .bat .chm .cmd .com .cpl .crt .exe .hlp .hta .inf .ins .isp .js .jse .lnk .mdb .mde .msc .msi .msp .mst .pcd .pif .reg .scr .sct .shb .shs .url .vb .vbe .vbs .wsc .wsf .wsh .zip •20% Heuristic filter •1% SPF •0.2% Bayesian filter Futher methods: •Hoax blocking (keywords based) •Automatic whitelis 26 Fastnet Mailcleaner • The Mailcleaner Viruswall uses the following guidelines to detect massive attacks: – Simultaneous number of connections by sender's IP address – Server black list – Regular Expression filters – Refused Recipient lists – eTrust Antivirus Computer Associates http://demo.mailcleaner.net/index.php cnlab / HSR 2/21/2005 27 The Mailcleaner "Enterprise Solution" is composed of modules. Which (and how many) modules to install depends on the daily e-mail volume that your mail servers process. The Basic Version consists of a single machine that manages all of Mailcleaner's operations, including the incoming queue, filtering, quarantining, and the management interface. This version is sufficient for a daily volume of roughly 50,000 messages. With daily traffic above 50,000 messages, the Advanced Version is ideal. This version uses multiple servers working in parallel. It may have one or more Entry Point servers, which queue incoming messages and then distribute them evenly over the Filtering Servers. The Management Server hosts the control database and the web-based management interface. Anti-spam – Mailcleaner uses a number of complementary techniques to distinguish spam from legitimate mail. Using artificial intelligence algorithms and daily updates, Mailcleaner adapts to identify the ever-changing techniques of spammers. Anti-virus – Mailcleaner scans all incoming mail for viruses, worms, and suspicious attachments that may hide malicious scripts. Web-based User Interface – Mailcleaner offers each user a simple way to review quarantine lists, change preferences, and consolidate reports for users who have more than one e-mail address. http://www.mailcleaner.net/docs/spec_en.html Pricing (regular price) per month License for 1000 mailboxes: 4800.- EUR, You will need 1 server to handle 50‘000 messages daily. License for 1...100 mailboxes: 500.- EUR, You will need 1 server to handle 500 messages daily. License for 500 mailboxes: 2400.- EUR License for 10‘000 mailboxes: 32‘530.- EUR, You will need 10 servers to handle 500‘000 messages daily. VAT and hardware excluded. 27 Wie werde ich Millionär? cnlab / HSR 2/21/2005 28 28 http://www.spamhaus.org/rokso/index.lasso • 200 known „Spam Operations“ (500-600 professional spammers) responsible for 90% of your spam – operate 'offshore' using servers in Asia and South America • spammer – listed in ROKSO if terminated by a minimum of 3 consecutive ISPs for AUP violations – spammers IP addresses are automatically sent to Spamhaus Block List • ROSLO assists – ISP Abuse Desks – Law Enforcement Agencies (with special, sensitive information version) cnlab / HSR 2/21/2005 29 •The Register Of Known Spam Operations (ROKSO) database collates information and evidence on the known spammers and spam gangs, to assist ISP Abuse Desks and Law Enforcement Agencies. •90% of spam received by Internet users in North America and Europe can be traced via redirects, hosting locations of web sites, domains and aliases, to a hard-core group of around 200 known spam operations. These spam operations consist of an estimated 500-600 professional spammers loosely grouped into gangs ("spam gangs"), the vast majority of whom are operating illegally. •Many of these spam operations pretend to operate 'offshore' using servers in Asia and South America to disguise the origin. Those who don't pretend to be 'offshore' pretend to be small ISPs themselves, claiming to their providers the spam is being sent not by them but by their non-existent 'customers'. Some set up as fake networks, pirate or fraudulently obtain large IP allocations from ARIN/RIPE and use routing tricks to simulate a network, fooling real ISPs into supplying them connectivity. When caught, almost all use the age old tactic of lying to each ISP long enough to buy a few weeks more of spamming and when terminated simply move on to the next ISP already set up and waiting. •ROKSO is a "3 Strikes" register: To be listed in ROKSO a spammer must first be terminated by a minimum of 3 consecutive ISPs for Access User Policy (AUP) violations. IP addresses under the control of ROKSO-listed spammers are automatically and preemptively listed in the Spamhaus Block List (SBL). •For Law Enforcement Agencies there is a special version of this ROKSO database which gives access to records with information, logs and evidence too sensitive to publish here. http://www.spamhaus.org/rokso/index.lasso 29 CREATIVE MARKETING ZONE Alain Ralsky (SPAM King) • • • • Aliases: Jeff Kramer, Additional Benefits , Creative Marketing Zone Inc , Sam Smith, William Window, ... 1997: couple of mailing lists, making $6,000 a week 2001: Creative Marketing Zone, Inc., Nevada 2002: 250 million valid addresses – – – – – • cnlab / HSR 2/21/2005 0.25% response rate 0.75% of mails opened (hidden notification code) 89 Million people have opt-out (between 1997 and 2002) up to $22,000, for single mailing to entire database stealth spam (Romanian program), detect computers that are online and then flash them a pop-up ad 2004: Hundreds of domains: aboutchpecha.com, ... 30 Some statements from Alain Ralsky (Mike Wendland: Spam king lives large off others' e-mail troubles, November 22, 2002 http://www.freep.com/money/tech/mwend22_20021122.htm and http://www.spamhaus.org/rokso/listing.lasso?-op=cn&spammer=Alan%20Ralsky): •"I've gone overseas," he said. "I now send most of my mail from other countries. And that's a shame. I pay a fortune to providers to do this, and I'd much rather have it go to American companies. But I have to stay in business, and if I have to go out of the country, then so be it." •The computers in Ralsky's basement control 190 e-mail servers -- 110 located in Southfield, 50 in Dallas and 30 more in Canada, China, Russia and India. Each computer, he said, is capable of sending out 650,000 messages every hour -- more than a billion a day -- routed through overseas Internet companies Ralsky said are eager to sell him bandwidth. •"I'll never quit," said the 57-year-old master of spam. "I like what I do. This is the greatest business in the world." It's made him a millionaire, he said, seated in the wood-paneled first floor library of his new house. "In fact," he added, "this wing was probably paid for by an e-mail I sent out for a couple of years promoting a weight-loss plan." •In 1997 he bought a couple of mailing lists from advertising brokers and, with the help of the computers, launched a new career that soon was making him $6,000 a week. •Ralsky said he includes a link on each e-mail he sends that lets the recipient opt out of any future mailings. He said 89 million people have done just that over the past five years, and he keeps a list of them that grows by about 1,000 every day. That list is constantly run against his master list of 250 million valid addresses. •The response rate is the key to the whole operation, said Ralsky. These days, it's about one-quarter of 1 percent. •Ralsky makes his money by charging the companies that hire him to send bulk e-mail a commission on sales. He sometimes charges just a flat fee, up to $22,000, for a single mailing to his entire database. •Ralsky has other ways to monitor the success of his campaigns. Buried in every e-mail he sends is a hidden code that sends back a message every time the e-mail is opened. About three-quarters of 1 percent of all the messages are opened by their recipients, he said. The rest are deleted. •Ralsky, meanwhile, is looking at new technology. Recently he's been talking to two computer programmers in Romania who have developed what could be called stealth spam. It is intricate computer software, said Ralsky, that can detect computers that are online and then be programmed to flash them a pop-up ad, much like the kind that display whenever a particular Web site is opened. "This is even better," he said. "You don't have to be on a Web site at all. You can just have your computer on, connected to the Internet, reading e-mail or just idling and, bam, this program detects your presence and up pops the message on your screen, past firewalls, past anti-spam programs, past anything. 30 Botnet Providing • networks of zombie PCs used – anonymous relays for spam – to launch denial of service attacks on websites – to steal confidential information about a PC's owner • More than 30‘000 PCs per day are being taken over to spread spam and viruses (bot nets peak of new recruits was 75‘000 in one day) • 4‘496 Windows viruses were detected in the first six months of 2004 • October 5, 2004, Spy Act cnlab / HSR 2/21/2005 31 The 75’000 new recruits per day peak in 2004 is due to a “battle” between the MyDoom and Bagle virus teams. October 5, 2004, the U.S. House of Representatives passed a bill to criminalize the act of altering PC configurations (Spy Act ), taking control and downloading software onto a PC without the owner's consent: By a 3991 vote, House members approved legislation prohibiting "taking control" of a computer, surreptitiously modifying a Web browser's home page, or disabling antivirus software without proper authorization. The Spy Act would also create a complicated set of rules governing software capable of transmitting information across the Internet. It would give the Federal Trade Commission authority to police violations of the law and to levy fines of up to $3 million in the most pernicious cases. 31 Beagle_J Mass Mailing Worm Attachment SMTP / HTTP File Sys. Backdoor cnlab / HSR 2/21/2005 32 •Beagle_J is a mass-mailing worm that opens a backdoor on TCP port 2745 and uses its own SMTP engine to spread through email. •Sends the attacker the port on which the backdoor listens, as well as the IP address. •Attempts to spread through file-sharing networks, such as Kazaa and iMesh, by dropping itself into the folders that contain "shar" in their names. 32 Beispiel: Botnet Nutzung • 21.02.2004: C’t Redaktion konnte von Virenverbreitern IP-Adressen infizierter Rechner kaufen • Virus "Randex[1]“: – Trojaner auf tausenden Rechnern installiert – empfängt Befehle wie etwa, • nach CD-Keys von Spielen zu suchen, • SYN-Flood-Attacken[2] vom infizierten System aus zu starten • oder unbemerkt weitere Software nachzuladen (installierte beispielsweise auch einen SOCKS[3]-Proxyserver, der zur Weiterleitung von Spam über die befallenen PCs genutzt wurde) cnlab / HSR 2/21/2005 33 Ferngesteuerte Spam-Armeen, Nachgewiesen: Virenschreiber liefern Spam-Infrastruktur, c't 5/04, S. 18 URL dieses Artikels: http://www.heise.de/newsticker/meldung/44869 Links in diesem Artikel: [1] http://vil.nai.com/vil/content/v_100401.htm [2] http://www.heise.de/security/artikel/43066 [3] http://www.socks.permeo.com/TechnicalResources/ProtocolDocuments .asp [4] http://www.heise.de/newsticker/meldung/44849 [5] http://www.ctmagazin.de [6] http://www.heise.de/english/newsticker/news/44879 [7] http://www.groklaw.net/article.php?story=20040221051056136 33 So what? cnlab / HSR 2/21/2005 34 34 • • • • • vorsichtiger Umgang mit eigener E-Mail-Adresse keine Programme von Fremden starten zentrale SPAM-Filter-Dienste nutzen lokale SPAM-Filter-Dienste nutzen … cnlab / HSR 2/21/2005 35 35 … e-Mail Harvaster Suchmaschinen nicht reinlassen cnlab / HSR 2/21/2005 36 36