Spam development - Part 1: New tricks
While you're sleeping well, your computer may be working as a peer-to-peer spam or node server, providing a source of processing for a malware network that pulls in any form of criminal activity. online.
Spam is used by botnet exploiters in a variety of new forms (such as hiding behind the release of Storm - a spam-malware hybrid) to build distributed robot networks (or botnets), causing the spam recipient's computer to become 'zombie' in the network. These zombies come together as an 'army' and they have a great competitive ability that sometimes surpasses the strongest supercomputers.
The problem is more difficult to solve when legitimate transactions, adjustment and execution modes are combined.
Change faster
Storm is a combination of spam and malware and it is estimated that they have spread to about 10 million computers, this number will continue to increase in the near future. However, there is currently no way to know how many computers are infected at the same time.
The rapid development of the spread rate suggests that the complexity and scale of current botnet dispersers is changing.
Spam is becoming more sophisticated. In the past 12 months alone, it has seen sudden changes, they have grown by a decade ago. So most importantly, detection methods need to grow fast to keep up with new spam technologies later on.
Detecting spam and preventing it scientifically must be promoted faster and maintained longer.
Anti-spam programs must be implemented with a variety of solutions while simultaneously maintaining the level of protection as well as tools. This means increasing processing time through a variety of tools, increasing the cost of product or service products by firms and expanding the potential for increasing the defect rate.
Storm's rise
After a quiet period, spam attacks followed the trend of Storm massively once again warning security researchers. Spam links to MP3 audio files, YouTube videos and Adobe pdf documents are used to trick recipients into downloading infected attachments or when users visit websites that contain malware. More dangerous is the spread through computers and bringing them into a remote controlled network.
This latest development wave is based on an attack on spam following the trend that Storm has taken before. It leads the recipient to fall into a phishing business system to gather information from the user.
According to Kaspersky, this is the first series of email spam using special graphics files that contain background audio (such as Adobe's .pdf files) to bypass spam filtering systems.
The creators of Storm and spam are even more dangerous when they "eat" the events or topics at the right time (like dancing with skeletons on Halloween, cheap drugs, announcing offers to link to Popular videos on YouTube, greeting cards and service ads .) are intended to attract recipients to open attachments or links to unsafe web sites.
In general, Storm spammers also constantly change the way to avoid spam and security defenses on other computers or networks.
Researchers at Kaspersky also made an assessment in a recent virus list announcement that ' Spammers once again create several types of attacks to renew the technology used when creating attachments. graphics in email spam (photo spam) during the first 6 months of 2007 '
Image spam is a huge problem for two main reasons:
The first is that simple identification of a photo is not always effective. Just changing a few pixels of pixels will break the traditional identity. There are millions of changes that can be applied without affecting the image content.
The second is that spammers use links to images that are placed on multiple websites. The image itself is not in the email until it is opened. Photos can be stored on websites of large companies that have been controlled by them and botnets use millions of legitimate email addresses to deliver mail.
Resilience to recovery
Although it is not often publicized as to embed code to remove the hard drive, disable the computer or install a keylogger to catch confidential data such as passwords, the Storm or Trojan worm has also proved that they are the most adaptable malware.
Spam Storm has demonstrated adaptability and extremely quick code changes based on spam filters or other defenses they encounter while trying to bypass network or computer protection.
Storm uses complex programming techniques to automatically repack herself. This is similar to someone changing costumes every 5 minutes during a small party. The inner nature is the same but the appearance has been changed. The creators of Storm kept track of how they were discovered and then launched new countermeasures.
It was the programmers Storm's diligence in avoiding detection that created a high-end malware.
This is just a simple way in many ways botnet uses to send spam. Basically, Storm does not spam better than other botnets. But it's better at self-installing and launching to avoid detection.
You should read it
- The most effective spam blocking tips
- Some measures to reduce spam
- Valentine 'revived' Storm Worm
- Instructions to delete spam automatically in Gmail
- The new Storm worm attacks Facebook users
- Why is Gmail filtering good spam?
- 2 ways to hide your email address on a website
- How many types of malware do you know and how to prevent them?
May be interested
- The development and future of Wi-Fi - Part 2in part 2 of this series, i will continue the discussion by showing you the current state of wi-fi and 802.11n technology.
- Spam strongly attacks social networksaccording to symantec depository service (symantec hosted services), spam distribution containing shortened url has peaked 23.4 billion spam in one day
- Fix the situation of Tet promotional spam messages on the phonelike on facebook, now smartphones are also being put into the sights of spam messages of all kinds from real estate, sim card ... and can not fail to mention a series of promotional services of the network in lunar new year is bombarding many people's messages.
- Managing Windows networks using Script - Part 11: Other script tricksin the previous part of this series we learned two tricks for remote control scenarios. in the previous section we saw two more script tips. the first tip, remote scripting tricks from a reader, a second tip, a real world example is used to show how to use the windows management instrumentation command-line (wmic).
- The development and future of Wi-Fi - Part 1in this series, i will show you some basic knowledge about this new technology, along with a brief outline of its development.
- Some measures to reduce spamspam is a common and often annoying component in email accounts. if you have no way to remove spam sent to your email, try some of the ways we introduce below.
- How will iOS 26 'kill' spam calls and messages?there's nothing more annoying than being interrupted by spam calls and unwanted messages while you're relaxing, working or spending time with friends.
- 10 ways to 'deal' with spamdo you find email software to work effectively? do these programs block spam effectively? do your important emails get caught in the spam mail? there are hundreds
- Be careful of the 'trap' spams during the Christmas seasonit's still over a month before christmas, but spammers have planned a whole 'spam holiday' for them.
- Instructions to block spam messages on Facebookfacebook users have recently received spam messages advertising promotions, classified ads, even scams won by strangers who do not know, send it daily, filled with mailboxes.