PDF & Image Attachment Spam – The New Problem with E-mail

Keep on Guard!


The spam landscape has changed quite a lot in the last year or so with image spam and now the latest tactic is PDF and .zip attachments.

PDF’s of course being preferred by spammers as you don’t need to extract anything to view their spam, you just open it in your favourite PDF viewer and read all about viagra and cialis!

Of course there was some nasty exploits in PDF recently aswell with some other XSS issues associated.

Anyway the point is GFI has recently released a new white paper exploring PDF spam, which describes how spammers have changed their spamming tactics over the years and how the common PDF file format has been adopted to send image spam.

This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.

It’s quite an interesting read.

The white paper is freely available for download here:

Attachment spam – The latest trend [PDF]

No registration is required to access this white paper.

If you have any questions about this subject, GFI has said we can ask them anything we want about this subject – so we can basically conduct an interview online about image/pdf/attachment spam and spam fighting measures in general.

So, if you have any questions just leave them in the comments, or if you feel they are too long – use the Contact Darknet form.

Thanks!

Posted in: Spammers & Scammers

, , ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


4 Responses to PDF & Image Attachment Spam – The New Problem with E-mail

  1. TheRealDonQuixote August 17, 2007 at 7:38 pm #

    hmm, now I’m afraid to open the O.J. “If I Did It” leaked PDF somebody emailed me. I better triple scan it.

    If I could ask one question from GDI, it would be, “How can we actively fight back against these spammers and scammers? The email headers are bounced all over the place and the mail exchange servers seem to be legit businesses. Is there any way to make a vacation responder or something that would spam them right back?”

    I know there was a push to try and do this legally on a larger front, although I forget the name of the project, but I wanna know hot to do it on my own just to be naughty.

  2. Sarah August 24, 2007 at 1:55 pm #

    Reply to TheRealDonQuixote>

    When dealing with spam/scam issues, replying back to the actual message might very well be one of the worst options.

    Since a large portion of these kind of emails are sent using a forged sender address, a reply may effectively be going to an innocent person generating what is called backscatter or outerscatter. Systems that generate a lot of backscatter may end up being blacklisted themselves in the process.

    The best way to combat spam, including the latest PDF spam technique is to use a server based anti spam solution.

  3. TheRealDonQuixote August 25, 2007 at 12:28 am #

    @ Sarah
    I’m sorry if I miscommunicated something in my question. I know not to reply to any spam for all of the reasons you listed, plus you may wind up verifying that your email address is real and incur further spamming.

    I was aiming at being more like a digilanti, all V for Vendetta style. Something a little more dark and dangerous. You know, hacking!!

    We all know that you can peak at a message header to see where the spam/scam might be routed through, as well as checking domain names and other basic net sleuthing. However, its like begging for an RSI to do all that manually. And once you have any pertinent information, if any at all, what can one do with it? Is there a list to check against for spammers and scammers? Then what? Herd computing? Bot nets? A group of uber naughty white hat garden gnomes that already do this type of backhacking?

    What I am really looking for here is a way to f**k with these guys when I’m bored. Why? Cause … hey everybody has a hobby!! ;)

  4. Sandeep Nain August 31, 2007 at 2:25 am #

    Well I must say this spam thing is increasing day by day and we need to fight against spammers…

    Now this PDF and Zip file spams gonna be really hard to identify till you open the file… ufff.. either you gonna loose some important emails or you end up wasting time on opening each emails…