As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection against the latest spam trends. When image spam first began its assault on email users in early 2006, Barracuda Networks was one of the first anti-spam vendors to provide Optical Character Recognition (OCR) capabilities to defend against this threat. Throughout the growth of image spam volume, Barracuda Email Security Gateway’s OCR techniques enabled it to maintain its target 95 percent effectiveness rating in the fight against spam with almost no false positives. Today, while the volume of image spam has remained stable, spammers have significantly increased the usage of yet another technique – sender identity obfuscation.
Barracuda Labs: 24x7 Operation
Barracuda Networks stays ahead of spammers through Barracuda Labs, an advanced technology center consisting of highly trained engineers that monitor the Internet for the latest trends in spam and virus attacks, and develop strategies to mitigate those threats. As new forms of spam and viruses emerge, Barracuda Labs is quick to respond to early outbreaks and delivers the latest definitions through Barracuda Energize Updates delivered every 30 minutes. Barracuda Labs operates 24-hours-a-day, seven-days-a-week and has access to a diverse network of spam traps (“honeypots”), as well as more than 70,000 Barracuda Email Security Gateways worldwide, amassing the most diverse compilation of active email traffic representing Internet Service Providers, government institutions, enterprises, and small and medium businesses. Using this expansive corpus of email, Barracuda Labs is able to detect the latest spam trends and can develop tactics to alleviate those threats in real-time.
Reputation vs. Profiling Techniques
Traditionally, reputation techniques have been used to combat spammers by profiling the sender’s history. Barracuda Networks utilizes a two-fold approach in determining an email sender’s reputation: Barracuda Reputation Analysis and Intent Analysis. Both Reputation and Intent Analysis, like many traditional reputation techniques, enable the Barracuda Email Security Gateway to block spam efficiently by doing a simple database lookup.
However, as spammers become more organized and more creative in their tactics, they have resorted to obfuscating their identities more systematically, rendering reputation data less effective on its own. Blocking these new forms of spam email requires the use of techniques that can profile the behavior of the sender and identify any uncharacteristic activity. Profiling techniques, such as Barracuda Networks Predictive Sender Profiling, are designed to look beyond the apparent reputation of the sender and dig deeper into the campaign itself to identify anomalous activity.
Consider this example: In the credit card industry, consumers’ reputations are profiled through credit scores, which essentially reflect the consumers’ purchasing history. If consumers are consistent in their buying habits, their reputations are easy to follow and their future buying activities are likely predictable. However, what if a consumer with historically consistent buying habits purchases a television at a popular retail store and then shortly after leaving the store, returns and purchases the same television within 30 minutes of the original purchase? Better yet, what if the consumer purchases 15 more televisions within the first 30 minutes of the original purchase? The credit card company would flag this as anomalous behavior and would likely contact the consumer to verify the subsequent purchases to make sure that the consumer’s credit card has not been stolen. Predictive Sender Profiling behaves in a similar fashion to the credit card company in this example.
When legitimate email senders abide by the rules of sending email, they build trusted reputations and their email behavior becomes easy to predict. If a typically good, or reputable, email sender sent a slew of email all at once, reputation databases would not flag the sender as a potential spammer because their past behavior was so pristine. Predictive Sender Profiling, however, profiles behavior independent of the sender’s past activity and would detect this uncharacteristic behavior and act accordingly by blocking unwanted email.
Reputation Alone Falls Short Against Botnets & Zombies
Sender identity obfuscation techniques often involve spammers taking control of networks of computers infected with malware (also called “botnets”), and sending email from diverse sources throughout the Internet. In doing so, the spammer effectively hides their own identity from traditional reputation checks that profile sender network addresses.
For example, in illustrations A, B, and C below, the spammer attempts to hide their identity by sending out virtually the same message from different addresses around the world. In illustration A, the message is detected as originating from an IP address in Germany. One day later, in illustration B the same message is picked up as coming from the UK and by the third day of the campaign, Barracuda Labs had identified the message again, this time coming from Spain. Clearly, in this example, the spammer had overtaken a series of computers (botnets) and used them for this particular campaign pushing Viagra and Cialis.
In addition to sending from different IP addresses, these sample emails all used different embedded URLs in an attempt to bypass Intent Analysis. In Illustration A, the URL points to http://joecalvin.info, in Illustration B, the URL points to http://www.uau.info, and in Illustration C, the URL points to http://shjindaio.info. Just as botnets have enabled spammers to send from many sender IP addresses, cheap domain registrations have enabled spammers to create new domain identities quickly and inexpensively.
Despite the inability to utilize traditional reputation techniques on these emails, the Barracuda Email Security Gateway, blocked these messages by profiling the sender’s behavior and predicting new instances of this email. In this case, the profiled behavior was derived from the need to provide domain name services (DNS) for all of the new domains. By recognizing that the spammer configured all of the new domains with the similar DNS settings as their known spam domains, the Barracuda Email Security Gateway was able to block all instances of these emails using its Real-time Intent Analysis capabilities.
Hiding Behind the “Good Guy”
By registering new domains or by redirecting to spam Web domains through reputable blogs, free Web site providers, or URL redirection services, spammers have also learned to hide their identity from traditional reputation checks that profile spam Web domains.
Illustrations D and E below show two separate spamming campaigns that were recently detected by Barracuda Labs in which the spammers attempt to hide their identity by using URLs referencing reputable Web domains, Geocities and Blogspot. Often these URLs contain either redirections or simple Web links to known spammer Web sites.
Despite these attempts to hide behind a “good” identity, the Barracuda Email Security Gateway profiled this campaign behavior of placing redirections or Web links to known spam sites behind popular Web providers. The Barracuda Email Security Gateway was able to block these messages through Multi-level Intent Analysis by following the embedded URLs as a Web browser would and inspecting the resulting contents.
Sample Behaviors & Countermeasures
When spammers obfuscate their identities, the Barracuda Email Security Gateway can use Predictive Sender Profiling to identify behaviors of all senders and apply the applicable Barracuda Email Security Gateway defense tactic. Examples include:
1. Sending too many emails from a single network address Automated spam software can be used to send large amounts of email from a single email server.
2. Attempting to send to too many invalid recipients Many spammers attack email infrastructures by harvesting email addresses.
3. Registering new domains for spam campaigns Because registering new domain names is fast and inexpensive, many spammers switch domain names used in a campaign.
4. Using free Internet services to redirect to known spam domains Use of free Web sites to redirect to known spammer Web sites is a growing practice used by spammers to hide or obfuscate their identity from mail scanning techniques such as intent analysis.
Barracuda Labs is well positioned to keep spam under control. Leveraging the industry’s most expansive corpus of email from over 70,000 customer systems ranging from small and medium businesses to Internet Service Providers and large enterprises, Barracuda Labs is well positioned to stay abreast of the latest Internet threats.
For computationally efficient processing of email, Barracuda Networks leverages this email corpus to provide industry-leading reputation data for both IP addresses through Reputation Analysis and Internet domain names through Intent Analysis.
Moving forward, as the usage of sender identity obfuscation increases, Predictive Sender Profiling makes the Barracuda Email Security Gateway well equipped to protect against spam that is typically unstoppable by traditional reputation filters.