• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

PDF & Image Attachment Spam – The New Problem with E-mail

August 17, 2007

Views: 7,461

[ad]

The spam landscape has changed quite a lot in the last year or so with image spam and now the latest tactic is PDF and .zip attachments.

PDF’s of course being preferred by spammers as you don’t need to extract anything to view their spam, you just open it in your favourite PDF viewer and read all about viagra and cialis!

Of course there was some nasty exploits in PDF recently aswell with some other XSS issues associated.

Anyway the point is GFI has recently released a new white paper exploring PDF spam, which describes how spammers have changed their spamming tactics over the years and how the common PDF file format has been adopted to send image spam.

This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.

It’s quite an interesting read.

The white paper is freely available for download here:

Attachment spam – The latest trend [PDF]

No registration is required to access this white paper.

If you have any questions about this subject, GFI has said we can ask them anything we want about this subject – so we can basically conduct an interview online about image/pdf/attachment spam and spam fighting measures in general.

So, if you have any questions just leave them in the comments, or if you feel they are too long – use the Contact Darknet form.

Thanks!

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Spammers & Scammers Tagged With: anti-spam, email-spam, gfi, spam



Reader Interactions

Comments

  1. TheRealDonQuixote says

    August 17, 2007 at 7:38 pm

    hmm, now I’m afraid to open the O.J. “If I Did It” leaked PDF somebody emailed me. I better triple scan it.

    If I could ask one question from GDI, it would be, “How can we actively fight back against these spammers and scammers? The email headers are bounced all over the place and the mail exchange servers seem to be legit businesses. Is there any way to make a vacation responder or something that would spam them right back?”

    I know there was a push to try and do this legally on a larger front, although I forget the name of the project, but I wanna know hot to do it on my own just to be naughty.

  2. Sarah says

    August 24, 2007 at 1:55 pm

    Reply to TheRealDonQuixote>

    When dealing with spam/scam issues, replying back to the actual message might very well be one of the worst options.

    Since a large portion of these kind of emails are sent using a forged sender address, a reply may effectively be going to an innocent person generating what is called backscatter or outerscatter. Systems that generate a lot of backscatter may end up being blacklisted themselves in the process.

    The best way to combat spam, including the latest PDF spam technique is to use a server based anti spam solution.

  3. TheRealDonQuixote says

    August 25, 2007 at 12:28 am

    @ Sarah
    I’m sorry if I miscommunicated something in my question. I know not to reply to any spam for all of the reasons you listed, plus you may wind up verifying that your email address is real and incur further spamming.

    I was aiming at being more like a digilanti, all V for Vendetta style. Something a little more dark and dangerous. You know, hacking!!

    We all know that you can peak at a message header to see where the spam/scam might be routed through, as well as checking domain names and other basic net sleuthing. However, its like begging for an RSI to do all that manually. And once you have any pertinent information, if any at all, what can one do with it? Is there a list to check against for spammers and scammers? Then what? Herd computing? Bot nets? A group of uber naughty white hat garden gnomes that already do this type of backhacking?

    What I am really looking for here is a way to f**k with these guys when I’m bored. Why? Cause … hey everybody has a hobby!! ;)

  4. Sandeep Nain says

    August 31, 2007 at 2:25 am

    Well I must say this spam thing is increasing day by day and we need to fight against spammers…

    Now this PDF and Zip file spams gonna be really hard to identify till you open the file… ufff.. either you gonna loose some important emails or you end up wasting time on opening each emails…

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

AI-Powered Malware - The Next Evolution in Cyber Threats

AI-Powered Malware – The Next Evolution in Cyber Threats

Views: 239

Introduction Artificial Intelligence (AI) is reshaping cybersecurity on both sides of the … ...More about AI-Powered Malware – The Next Evolution in Cyber Threats

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 369

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 676

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 597

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 638

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 482

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (230)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,299,263)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,111)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,648)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,694)
  • Password List Download Best Word List – Most Common Passwords (933,536)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,175)
  • Hack Tools/Exploits (673,304)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,194)

Search

Recent Posts

  • AI-Powered Malware – The Next Evolution in Cyber Threats May 21, 2025
  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy