Friday, May 29, 2009

Here's how to combat e-mail spam scams

It looks like the FBI has been busy lately sending e-mails to people telling them they need their assistance in an investigation.

The FBI is on a hiring spree(fbijobs.gov), but spam is not a recruiting tool.

The e-mail, pretending to be from the FBI, promises to release the money that you were promised when you were, get this, "transacting with ... some impostors claiming to be The Federal Bureau of Investigation."

The FBI Anti-Terrorist and Monetary Crimes Division does not exist, the FBI says in a press release on this topic. Nor does the FBI have a unit in Nigeria - although because most of this garbage originates there, that might not be such a bad idea.

Many of the people who get these e-mails are upset by them. Here's part of an e-mail I recently received from Hector Pequeno, a fed-up reader:

"I am constantly almost daily dealing with e-mails like this. Where are they getting my address? Should I be concerned? Is there an organization I should forward these to so they would be aware? Should I just delete and ignore?"

Let me answer these questions:

Where do they get your address?

E-mail addresses are easily culled from all sorts of sources. People who enter drawings, make purchases online or sign online petitions can get their e-mail into a list sold to spam operations. Sometimes a person who legitimately has your e-mail is the victim of a computer hijacking. That lets all the people in their address book get bombarded with spam.

If your e-mail appears anywhere on the Internet, you are fair game. It's likely one of the reasons I get a few hundred spam e-mails every day.

Another way to get e-mails is through what the Federal Trade Commission has called a "dictionary attack." The spammer creates a list of letter and number strings in front of an "@" sign and common domain name. That generates millions of spam e-mails, some of which hit valid addresses.


E-mail scam hits UI students

When hundreds of thousands of people were losing their jobs each month, UI freshman Tim Riphagen was offered one that contended it could pay him several hundred dollars per week.

All he needed was a computer with Internet access.

“I’ve been told by lots of people to be aware of making money off the Internet,” Riphagen said. “But I decided it’s easy money, and I will try it out.”

Now, he wished he had just hit the delete button.

Riphagen is not the only one who got this job offer. On Jan. 11, an estimated 21,000 UI students received the same letter through their university e-mail accounts, offering them a “challenging and well-paid employment opportunity.”

Ostensibly coming from someone called “Carla Baker” and addressed to each recipient’s first name, the e-mail said students could earn $300 to $550 each week by participating in online surveys.

Out of the 497 respondents who replied to this reporter’s questionnaire — which was sent out to more than 30,000 UI students in March — nearly 40 wrote back to Baker in an attempt to learn more about the job.

“Oddly enough, I did reply to that e-mail — which is very uncharacteristic of me,” said Michael Place, a sophomore in computer science. “I am pretty good with computers and technology and do not normally fall prey to such traps, but for some reason, this one got the better of me.”

The e-mail tricked more students than Place.

At least four students paid a $30 membership fee to Baker’s company, and three more had paid to similar companies, the questionnaire shows.

But no one received a cent.

“It is definitely a waste of the $30,” said Erin Carney, a freshman in informatics. “I thought I could trust it because it came to my university e-mail.”

But the university Hawkmail system isn’t a perfect filter.

The questionnaire shows UI students receive an average of five spam/scam e-mails per week and dozens in a three-month period.

Although the UI uses the commercial software PureMessage to filter spam and tag suspicious e-mails, the software cannot recognize all junk mail, employees of Information Technology Services said.

That’s what happened with the Baker e-mail.

In an effort to find out who sent the letter to thousands of UI students, this reporter tracked the scam back to Sofia, Bulgaria, locating a business executive who said he had been unknowingly victimized by the fraud.

Various Internet blogs and discussion boards reveal that “Carla Baker” sent identical e-mails around the same time to California universities and to Melbourne, Australia.

The Internet Crime Complaint Center received 275,000 fraud complaints nationwide last year — a 33 percent increase from 2007. Of those complaints, more than three-fourths of fraudulent contact took place via e-mail.

When the scam came to the UI

For the student victims, the e-mail trail started shortly after they responded to “Carla Baker” and received a reply thanking them for their interest and directing them to a website — KTY Research.
KTY Research describes itself as a leading marketing-research organization. To become a member and receive payment for taking online surveys, people are required to pay a $30 one-time membership fee to access a “database” of KTY’s “partner companies.”

After gaining access, members can register with KTY’s “partners” by filling out profiles. They then need to await e-mail invitations to participate in online surveys, each worth $5 to $100, KTY says.
Carney and her friend paid the $30 fee but never earned any money.

Riphagen arguably had a worse experience. After paying KTY, he signed up with many “partner” companies. On one survey site, he had to pay a $4 shipping fee to get a free sample product before receiving $10 for a survey he took. Two weeks later, he found an unsolicited charge of $87.13 on his debit card by the survey site.

“I was pissed,” he said. “It’s a whole scam thing.”

Approximately 1 in every 100 American adults fall victims to fraudulent work-at-home programs in which the purchasers earned less than half of the promised amount, according to the Federal Trade Commission’s latest Fraud Survey in 2005.

The chain game

Many students who responded to the questionnaire wondered how the scammer obtained their university e-mail addresses and first names.

“[The Baker e-mail] looked legitimate because it was sent to my university e-mail address,” Place said. “Very few people outside the university would know this address.”

But that’s not the case for scam artists.

Student e-mail addresses are listed in the university’s online directory, and scammers have special computer software that can simulate a person accessing the directory and copying it onto an e-mail list, said Jane Drews, the UI’s information technology security officer. The software can even generate customized e-mails addressing to students’ first names.

“You can write a program to do anything,” she said.

E-mail lists can also be traded numereous times on the black market and online hacker communities. To make money and combat the often-low respondent rate, scammers need to send mass e-mails to millions of people, Drews said.

But sending mass e-mails was only the first step of the Baker scam. The game started at KTY’s website, which the e-mail job offer directed people to.

Although the site indicates it was established in 2003, a domain search through the web tool whois.com showed it was created on Jan. 1, just days before thousands of UI students got the mass e-mail.

However, the search could not reveal the website’s owner because all the contact information was provided by a third-party registration service, Privacy Protect, which works to conceal KTY’s identity.

A call to Privacy Protect initially led to an answering machine in Denmark. Moreover, an executive at one of KTY’s listed partner companies said he had never heard of KTY.

But this was a key part of the trick.

John Murry, a UI associate professor in marketing, said most survey websites are middlemen: market research companies paid to recruit survey takers, and the survey websites then pay individuals to complete questionnaires for the original research companies.

KTY Research, however, secretly joins the chain, charging a “membership fee.”

“You should never pay to take a survey,” Murry said. “The money flows the other way.”

Tracing the scammer

Upon learning of this reporter’s findings, Privacy Protect disabled its privacy service for KTY Research. Contact details for the website then became searchable on the Internet.

A second domain search revealed KTY’s owner to be Lyubomir Lalev in Sofia, Bulgaria. The website was registered under the company Goton Ltd., which sells health and sports products in the country.
However, Lalev, reached by phone in Bulgaria, denied knowing about KTY Research.

“I’ve never worked on a computer,” said Lalev, the manager of Goton Ltd. Sounding nervous as he spoke through a translator while driving, he said: “I have no idea what’s going on.”

Lalev said he has three employees and doubted they could design a website in perfect English.

“This is too much for me,” he said, his voice trembling. “I have to pull over my car.”

Lalev vowed to investigate the situation. In a phone call one week later, Lalev said he suspects the person who designed the Goton, Ltd. website stole his identity. However, he said, he never made any direct contact with the site’s designer because his employees handled everything via e-mail two years ago. Since then, nobody has updated his company website, he said.

Although unable to identify the culprit, Lalev said, he asked KTY Research’s hosting service to clear his name, which worked.

A following domain search showed KTY’s owner to be “James P” in New Belgrade, Serbia.

Who can catch the scammer?

Although there are relevant anti-spam laws, it’s hard to enforce them, local police officials said.
“The victim may be here, but the crime is virtual and generated elsewhere,” said Iowa City police Sgt. Troy Kelsay. “We just don’t have the resource to investigate across the country or the ocean.”
Lt. Jim Steffen, the Iowa City police investigation commander, agreed.

“The law has no problem,” he said. “It’s just the Internet that shrinks the world.”

But the Internet in different locations is not necessarily the same.

Before Sara Hawley transferred to the UI for her junior year, she never had any spam problems at her previous school, the University of Northern Colorado.

And students from Iowa State University and the University of Northern Iowa said they rarely receive any spam e-mails.

The UI has a mass e-mail policy that requires anyone who wants to send a message to more than 1,000 UI recipients to go through an official review process, but scammers simply go around this rule.

In the end, many wonder who can, or should, catch the scammer.

“If the [criminal] action goes on long enough, it will get caught,” said Eunjin Jung, a UI assistant professor of computer science. “But at this point, and as an everyday person, the best thing to do is to get educated.”

Fortunately, Riphagen’s bank helped him get his $87 back. He has since withdrawn his membership from all of KTY’s partner companies.

“I screwed up,” he said. “I’m glad my experience can tell other people not to screw up.”

Anti-Spam Gateway Accuracy Was the Basis for Recent Tolly Tests of Red Condor, Google, Barracuda and Cisco

The first version of our "best practices" guide for evaluating anti-spam accuracy is in final preparation and is available for purchase now with a delivery date of the first week of May 2009.

This document was the basis for recent Tolly tests of Red Condor, Google, Barracuda and Cisco. Anti-spam testing is very complicated and it is essential to employ correct techniques in testing. Additionally, it is important that the proper formula be used in reporting results. The RFP covers these areas in detail.

Use this report to:

  • Avoid common pitfalls
  • Reduce the time commitment required to become an expert on testing anti-spam systems
  • Reduce or eliminate consulting costs related to solution procurement
  • Boost accuracy of product benchmarking
  • Utilize proven test methodologies to ensure accuracy
  • Educate your team on the full scope of possible tests
  • Improve analysis of test results
  • Understand key elements of user quality-of-experience

More Than 90 Percent of E-Mail is Spam

If a new spam report from Symantec's MessageLabs is surprising, you probably haven't checked your inbox recently.

About 90.4 percent of all e-mail is spam, an increase of 5 percent from last month, MessageLabs said Tuesday. That means one out of every 1.1 e-mails is a spam message.

What caused the spike? Webmail, social networking sites, and botnets are just a few of the culprits, the company said.

Webmail and social networking profiles are "goldmines for spammers," according to MessageLabs. "All spammers use is a subject line and a valid hyperlink to active profiles on one of a number of major social networking sites. These e-mails originate from legitimate addresses on some of the main webmail providers making them harder to catch by regular anti-spam filters."

Spammers are also taking advantage of social networks via tools that crack the automated CAPTCHA terms users must type in before setting up accounts.

Spammers are most active during the U.S. workday, MessageLabs found, suggesting that active spammers are either based in this country or find the U.S. workforce the most attractive targets.

"A new harder to crack CAPTCHA technology is on the horizon and spammers want to maximize their profits before this new breed of CAPTCHAs are let loose as a deterrent to spammers and phishers," according to MessageLabs.

Meanwhile, about 57.6 percent of spam was sent via botnets. The most active botnet, known as Donbot, sent 18.2 percent of spam and is most active in Asia. Two botnets, known as Rustock and Bagle, meanwhile, are most active in the Americas and make up 20 percent of spam. In the rest of the world, there are the Cutwail and Xarvester botnets, which account for 10 percent of spam.

In related news, the White House announced Tuesday that it will release its 60-day Cyberspace Policy Review on Friday.

"The administration recognizes the very serious threats public and private sector networks face from cybercrime and cyberattack," press secretary Robert Gibbs said during a press briefing. "Recognizing these threats the President has elevated cybersecurity to a major administration priority, undertaking the early comprehensive interagency review."

"The report is an important first step towards securing our nation's cyber infrastructure," Gibbs concluded.