Our Take: Any Spam is too Much - InformationWeek
07:30 PM
Moving UEBA Beyond the Ground Floor
Sep 20, 2017
This webinar will provide the details you need about UEBA so you can make the decisions on how bes ...Read More>>

Our Take: Any Spam is too Much

Spammers are refining their tactics. IT must do the same.

Spam is big business, and economics are in the bad guys' favor. Say a spammer blasts 100 million messages. If just 1% get through, and 1% of those are answered, that amounts to 10,000 responses. No other advertising is as cost-effective, so to win we must turn the economics of spam around.

Problem is, anti-spam systems lose effectiveness as the volume of e-mail increases. Filters may be just as successful as always, says Greg Olsen, director of product management at Sendmail. But the rub is that, with twice the spam this year as last, a filter that lets only 10% through will be allowing twice as much junk. Users--including those who sign the checks for new purchases--will notice the increase, and this is keeping anti-spam vendors we spoke with awake at night.

InformationWeek Reports

Make no mistake: It's an arms race. Spammers are constantly developing new techniques, employing professional software developers, and investing in technology to create the sophisticated systems needed to evade controls. In 2007, we saw the damage done by botnets, armies of infected computers that enable spammers to avoid the expense of purchasing Internet connectivity and the hassle of having that connectivity shut off once the ISP realizes what's going on. Another dark benefit of botnets is that spam is sourced from many different nodes, making it much harder to choke the flow. The Storm worm, with morphed versions appearing constantly, reflects a new trend of all-purpose botnets, in which infected computers download their tasks from a central controller.

As for technique, image and attachment spam has largely been replaced by link spam. These messages include some teaser text and a Web URL that delivers a one-two punch in that the Web pages often use browser bugs to infect the recipient's computer, adding it to the botnet. With link spam, the botnet tactic pays off twice for spammers, as they can direct part of their botnets to act as Web servers hosting the pages and malicious code.

Return to the story:
E-Mail In Peril

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll