{"id":17,"date":"2008-03-17T12:25:45","date_gmt":"2008-03-17T16:25:45","guid":{"rendered":"http:\/\/www.szmidt.org\/blog2\/?p=17"},"modified":"2009-03-19T12:53:40","modified_gmt":"2009-03-19T16:53:40","slug":"the-threat-from-email","status":"publish","type":"post","link":"https:\/\/www.szmidt.org\/blog2\/2008\/03\/17\/the-threat-from-email\/","title":{"rendered":"The threat from email"},"content":{"rendered":"<p>TRACE (Threat Research and Content Engineering) is a group of Marshal security analysts who constantly monitor and respond to Internet security threats. TRACE provides a service to Marshal customers as part of standard product maintenance. The service includes updates to Marshal&#8217;s unique, proprietary anti-spam technology, SpamCensor. TRACE analyzes spam, phishing and Internet security trends and provides frequent automated updates to Marshal customers. TRACE also provides &#8220;Zero Day&#8221; security protection to secure Marshal customers against new email and virus exploits the day they emerge.<\/p>\n<p>There are several terms that are typical in this area:<\/p>\n<p><em>Phishing<\/em>, is a play on the word fishing, and does pretty much the same but for information instead of fish. By gathering information from computers and or people they gain enough of an edge to gain access and control over others computers.<\/p>\n<p><em>Malware<\/em> is software which is written to basically help cyber-criminals gain information and access to other peoples computers and networks. It might be hiding in web code (html) or some attachment like an mp3 or pdf file.<\/p>\n<p>A <em>Botnet<\/em> is a network of &#8220;contaminated&#8221; computers that are under the control of the cyber-criminals. It is used to send bulk emails and to conduct mass attacks.<\/p>\n<p>&#8220;It would be incomplete to discuss spam without commenting on the<br \/>\nmalware and criminal activity that sustains it. Distributing spam and<br \/>\nmalware is firmly in the domain of professional criminals looking for<br \/>\nfinancial gain. In the last six months, cyber-criminals have, unfortunately,<br \/>\nreached new heights of sophistication and capability.<\/p>\n<p>&#8220;Not only have the large botnets taken over in terms of spam volume, they<br \/>\nhave also evolved to reach new levels of sophistication. During the middle<br \/>\nof 2007, the Storm botnet grew rapidly following mass spamming of emails<br \/>\ncontaining links to websites hosting malicious code. The websites not<br \/>\nonly hosted executable files that could be downloaded by users, but they<br \/>\nalso hosted malicious code that attempted to exploit a number of different<br \/>\nknown browser vulnerabilities.<\/p>\n<p>The above are quotes from <a href=\"http:\/\/www.marshal.com\/TRACE\/Resources.asp\">www.marchal.com<\/a>. The link points to a page where you can read the whole report, and others.<\/p>\n<p>In the report Marshal talks about cyber-criminals, &#8220;They operate in a thriving underworld marketplace where services, software tools, and software development are freely bought and sold. Computer skills are no longer necessary to execute cybercrime.&#8221;<\/p>\n<p>They point out that in a recent case a botnet was rented out for $200\/week which a spammer can use to send 100 million spam messages. With the considerable income from naive Internet shoppers a lot of money can and is made, which is of course what is attracting people who feel unable to earn an honest income.<\/p>\n<p>Big sites are also hacked to help distribute the malware. MySpace, monster.com are but two examples. By generating a large amount of accounts with gmail, hotmail and the like they are able to spam from these accounts in bulk.<\/p>\n<p>I strongly recommend that if nothing else you read the conclusion and recommendations at the last two pages. (<a href=http:\/\/www.marshal.com\/TRACE\/Resources.asp>marshal.com<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-17","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/posts\/17","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":6,"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/posts\/17\/revisions"}],"predecessor-version":[{"id":20,"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/posts\/17\/revisions\/20"}],"wp:attachment":[{"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/media?parent=17"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/categories?post=17"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.szmidt.org\/blog2\/wp-json\/wp\/v2\/tags?post=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}