PDF & Image Attachment Spam – The New Problem with E-mail


The spam landscape has changed quite a lot in the last year or so with image spam and now the latest tactic is PDF and .zip attachments.

PDF’s of course being preferred by spammers as you don’t need to extract anything to view their spam, you just open it in your favourite PDF viewer and read all about viagra and cialis!

Of course there was some nasty exploits in PDF recently aswell with some other XSS issues associated.

Anyway the point is GFI has recently released a new white paper exploring PDF spam, which describes how spammers have changed their spamming tactics over the years and how the common PDF file format has been adopted to send image spam.

This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.

It’s quite an interesting read.

The white paper is freely available for download here:

Attachment spam – The latest trend [PDF]

No registration is required to access this white paper.

If you have any questions about this subject, GFI has said we can ask them anything we want about this subject – so we can basically conduct an interview online about image/pdf/attachment spam and spam fighting measures in general.

So, if you have any questions just leave them in the comments, or if you feel they are too long – use the Contact Darknet form.

Thanks!

Posted in: Spammers & Scammers

, , ,


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


4 Responses to PDF & Image Attachment Spam – The New Problem with E-mail

  1. TheRealDonQuixote August 17, 2007 at 7:38 pm #

    hmm, now I’m afraid to open the O.J. “If I Did It” leaked PDF somebody emailed me. I better triple scan it.

    If I could ask one question from GDI, it would be, “How can we actively fight back against these spammers and scammers? The email headers are bounced all over the place and the mail exchange servers seem to be legit businesses. Is there any way to make a vacation responder or something that would spam them right back?”

    I know there was a push to try and do this legally on a larger front, although I forget the name of the project, but I wanna know hot to do it on my own just to be naughty.

  2. Sarah August 24, 2007 at 1:55 pm #

    Reply to TheRealDonQuixote>

    When dealing with spam/scam issues, replying back to the actual message might very well be one of the worst options.

    Since a large portion of these kind of emails are sent using a forged sender address, a reply may effectively be going to an innocent person generating what is called backscatter or outerscatter. Systems that generate a lot of backscatter may end up being blacklisted themselves in the process.

    The best way to combat spam, including the latest PDF spam technique is to use a server based anti spam solution.

  3. TheRealDonQuixote August 25, 2007 at 12:28 am #

    @ Sarah
    I’m sorry if I miscommunicated something in my question. I know not to reply to any spam for all of the reasons you listed, plus you may wind up verifying that your email address is real and incur further spamming.

    I was aiming at being more like a digilanti, all V for Vendetta style. Something a little more dark and dangerous. You know, hacking!!

    We all know that you can peak at a message header to see where the spam/scam might be routed through, as well as checking domain names and other basic net sleuthing. However, its like begging for an RSI to do all that manually. And once you have any pertinent information, if any at all, what can one do with it? Is there a list to check against for spammers and scammers? Then what? Herd computing? Bot nets? A group of uber naughty white hat garden gnomes that already do this type of backhacking?

    What I am really looking for here is a way to f**k with these guys when I’m bored. Why? Cause … hey everybody has a hobby!! ;)

  4. Sandeep Nain August 31, 2007 at 2:25 am #

    Well I must say this spam thing is increasing day by day and we need to fight against spammers…

    Now this PDF and Zip file spams gonna be really hard to identify till you open the file… ufff.. either you gonna loose some important emails or you end up wasting time on opening each emails…