小男孩‘自慰网亚洲一区二区,亚洲一级在线播放毛片,亚洲中文字幕av每天更新,黄aⅴ永久免费无码,91成人午夜在线精品,色网站免费在线观看,亚洲欧洲wwwww在线观看

分享

Websense Security Labs

 昵稱60981 2008-04-16
Websense Security Labs ThreatSeeker™ technology has discovered that Windows Live Mail accounts have been targeted in recent spammer tactics. In these recent attacks, spammers have managed to create bots that are capable of signing up and creating random Live Mail accounts that could be used for a wide range of subsequent attacks.

Windows Live Mail is a part of the Microsoft Windows Live portfolio of services. It is a free webmail service by Microsoft. It was first announced on November 1, 2005 as an update to the Microsoft MSN Hotmail service. Its worldwide release was on May 7, 2007, and roll-out to all existing users was completed in October 2007.

Websense believes that there are three main advantages to this approach for the spammers. First, the Microsoft domain is unlikely to be blacklisted. Second, they are free to sign up. And third, it may be hard to keep track of them as there are millions of users worldwide using the service.

Let’s see how this process is automated.

First, the bot is observed to request the Live Mail registration page and it begins filling in the necessary form fields (as any ordinary user would be required to) with random data. When it comes to the CAPTCHA verification test, the bot sends the CAPTCHA image to its CAPTCHA breaking service for the text in the image.

Screenshot showing the image sent to the bot’s CAPTCHA breaking service for a break request





Next, we observe the bot receiving a response from the server with the text in the CAPTCHA image.

Screenshot showing the bot receiving the answer of “89YTSJ9W”, which is the last piece to complete the registration for the Windows Live Mail service



And of course, the spammers have now streamlined the process of mass-registering free email accounts for nefarious purposes.

Screenshot showing the bot repeating this process over and over. Wash, rinse, and repeat.



We note that on average, 1 in every 3 CAPTCHA breaking requests succeeds—setting the bot’s success rate at around 30-35%.

Screenshot of accounts created for spamming



Screenshot of the emails sent by these fake Windows Live Mail accounts



Screenshot of sites where these emails send users



The malicious executables have MD5 fingerprints of ed763fe783cbf45aa8a652964cfb180e and a6eb7adab36c253a13c16fa5c52b27bd.

Websense believes that these accounts could be used by the spammers at any time for a variety of social-engineering attacks in future. A wide range of attacks would be possible using the same account credentials in other significant and extended Live services offered by Microsoft Corporation, such as Live Messenger (instant messaging), Live Spaces (online storage), etc.
Bookmark This Post:

    本站是提供個(gè)人知識(shí)管理的網(wǎng)絡(luò)存儲(chǔ)空間,所有內(nèi)容均由用戶發(fā)布,不代表本站觀點(diǎn)。請(qǐng)注意甄別內(nèi)容中的聯(lián)系方式、誘導(dǎo)購(gòu)買等信息,謹(jǐn)防詐騙。如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請(qǐng)點(diǎn)擊一鍵舉報(bào)。
    轉(zhuǎn)藏 分享 獻(xiàn)花(0

    0條評(píng)論

    發(fā)表

    請(qǐng)遵守用戶 評(píng)論公約

    類似文章 更多