Character recognising spam breaking CAPTCHA defences
Webmail and OCR based spam is on the increase, which traditional web filters are having difficulty detecting.
It said that there was more spam capable of beating the response test, which is used to ensure content is generated by a human manually typing letters and numbers rather than a computer. CAPTCHA (Completely Automated Public Turing Test to tell Computers & Humans Apart) was developed by Carnegie Mellon University in 2000 to stop spam robots.
However there are ways to get past this security such as Optical Character Recognition (OCR), which is mechanical or electronic translation of the electronic images. Sometimes it was possible to completely bypass the CAPTCHA.
"In email security we've developed pretty advanced OCR technology to deal with image based spam," said Bradley Anstis, vice president of products at Marshal. "I think some spammers are using tools we've created against the industry to help them break the CAPTCHA codes."
However, he did go on to say that the bigger problem was that many businesses and websites were not even bothering to implement CAPTCHA.
"Even though CAPTCHA technology is evolving and there are new ways of doing it its still up to the companies to deploy these on their websites," Anstis said. "That traditionally has been the hardest thing to do."
The report said that using webmail accounts for spam made IP reputation or message header inspection less effective. Spam would be generated from Gmail, Yahoo and Hotmail accounts, so they would look to come from legitimate sources.
"This email is typically generated using a well-formatted composition type engine so the headers are really tidy and bodies are really neat," Anstis said.
"Traditional spam filters that look at the structure of an email message looking for addresses of bulk mailers are less effective. Webmail messages conform to all right the standards."
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now