Mail Viruses Junk Spam Phishing and now Dark?



Okay, I’ve seen a new term come across the horizon in the battle of the email inbox. First there were viruses, then junk mail, which became known as Spam and then Phishing attacks now we’re up to DarkMail. According to scmagazine , an IT security focused publication, the earmarks of darkmail are similar to junkmail but greater in volume. According to the article one domain withstood 10 million messages in one day as the sender went alphabetically through addresses on the domain.


In some cases this is used simply as a Distributed DoS (Denial of Service) attack, but more often now as a way of brute forcing the message through junk filters. With a DDoS it’s possible to filter out the source IP addresses and just drop connections from them. (Most seem to be residential virus laden/trojan infected machines.) However, as the numbers of machines involved grow it becomes frustratingly tedious to block them all. Plus, there’s a bit of know how involved with filtering out offending IP’s. Maybe mail server software should have an automatic “pacing”. In other words if you receive too many connections from the same machine in a limited period of time, block it for a longer period to cool its heels a bit. If it’s a legitimate transaction, most of those would be one or two messages at a time, but if it’s a mailing list it could be more. Even so, a legitimate user wouldn’t mind the delay. As the intensity of incoming messages from a single IP continues perhaps the delay should continue to get longer?

Related Posts

Blog Traffic Exchange Related Posts
  • What a week.... I think it's time to pass along a long story of what's gone on over the last week or so here and some of the reasons there hasn't been anything posted. Generally, I would say that work has been busy, but something happened last week that went a bit beyond......
  • More on the virus/trojan front I have a couple new things to post. One, in my futher investigation of the server logs, from the last big topic.... (read the entries below.) I've discovered at least one MAC, so this should be a warning that no one should take system security for granted. Likely someone has......
  • Network security - what does arp spoofing mean for wireless? So, if you haven't already had enough cause to tighten your wireless security.... we've been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can "own" all traffic from you machine......
Blog Traffic Exchange Related Websites
  • Creating and Hosting Blog Carnivals When it is done properly, creating and organizing your own Blog Carnival is a practice that can be truly rewarding. This is especially true if you are trying to increase your blogging experience, and by proxy, your traffic. The Blog Carnival is one of the finest innovations in the blogosphere......
  • Click to Call Adding click to call (click2call) capability to your blog will enable users to call you directly from your website. Clients, buyers, or shoppers no longer need to leave your website or even their computer to initiate a phone call. There are settings to control the looks and feel of the......
  • 4 Top Tips to Stop an Inbox Full of Junk Do you find that whenever you open your inbox there are 476 junk e-mails, 94 SPAM e-mails and 20 really important ones buried in there somewhere amongst all the inbox junk? These 4 top tips will help you drastically reduce the amount of junk e-mails and SPAM you receive.......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site