Feeds

Russian serfs paid $3 a day to break CAPTCHAs

Semi-automated attack or chain-mail gang

Internet Security Threat Report 2014

Why should miscreants bother to develop cutting edge programming techniques when they can pay $3 to somebody to set up spam-ready webmail accounts on their behalf? Evidence has emerged that people as well as malware are being used to defeat CAPTCHAs, challenge-response systems that are often used to stop the automatic creation of webmail accounts by spammers.

CAPTCHAs typically help ensure that online accounts can't be created until a user correctly identifies letters depicted in an image. The tactic is designed to frustrate the use of automated sign-up tools by spammers and other miscreants.

Over recent months security firms have reported that first the Windows Live CAPTCHA used by Hotmail, and later the equivalent system at Gmail, have been broken by automated attacks.

Obtaining a working Gmail account has a number of advantages for spammers. As well as gaining access to Google's services in general, spammers receive an address whose domain is highly unlikely to be blacklisted, helping them defeat one aspect of anti-spam defences. Gmail also has the benefit of being free to use.

An analysis of spam trends in February 2008 by net security firm MessageLabs revealed that 4.6 per cent of all spam originates from web mail-based services.

The proportion of spam from Gmail increased two-fold from 1.3 per cent in January to 2.6 per cent in February, most of which spamvertised skin-flick websites. Yahoo! Mail was the most abused web mail service, responsible for sending 88.7 per cent of all web mail-based spam.

The idea that automated tools have been used by spammers to set up these webmail accounts has become, if not the conventional wisdom, then at least a working hypothesis in security circles of late.

However a senior engineer at Google has stepped forward to cast doubt on these reports.

Brad Taylor, a Google software engineer, said internal evidence suggests that low-paid laborers in third-world countries (rather than compromised PCs) are being used to register accounts that are subsequently used to send spam.

"You can see it is clearly done by humans," Taylor told the New York Times . "There are patterns in the rate we find bogus accounts, like at night time and when people get off work" in particular locations around the world.

Taylor conceded that software might be used to partially automate the process - with bots signing-up for accounts before sending the puzzles to real people - but maintains that the CAPTCHA process remains effective.

Google's contention that low-wage workers are been paid to break watchers is supported by anecdotal evidence unearthed by Websense, which has been active in researching the issue over recent months. The firm found Russian language documents instructing modern day serfs on the art of CAPTCHA breaking.

"If you are unable to recognize a picture or she is not loaded (picture appears black, empty picture), just press Enter. In no case do not enter random characters! If there is delay in downloading images, exit from your account, refresh the page and go again," the documents, found on a website and translated into English, state.

The documents go on to say that CAPTCHA-busters are paid a minimum of $3 a day.

Even if miscreants need human involvement in breaking CAPTCHAs right now this might not always be the case. The solutions to solve puzzles might be fed back to make CAPTCHA-busting algorithms smarter, MessageLabs warns. It said that focusing on whether miscreants are an algorithm, a 'mechanical turk', or combination of the two to break CAPTCHAs misses the bigger point that the approach no longer provides a reliable security mechanism to protect email services from abuse. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.