CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
March 22nd, 2010

Pushdo Spam Botnet Pierces Microsoft Live Through Audio CAPTCHA

The prolific Pushdo spam botnet has found a new way to penetrate Microsoft’s Live.com by exploiting weaknesses in the audio captchas designed to prevent automated scripts from accessing the popular email service.

A new version of the bot causes infected PCs to pull down Live.com audio captchas and return the correct response within 10 seconds, according to a researcher at anti-virus firm Webroot. The attack allows the zombi machines to send email through accounts with a Live.com address, which are whitelisted by many spam filters. The technique offers spammers an alternative to sending spam through open mail relays, which are often blacklisted.

“In one seven minute test period where I permitted the bot to operate freely, the bot demonstrated [a] remarkable capability to bypass the audio captchas,” Webroot researcher Andrew Brandt wrote Monday Morning. “In most cases, it was able to submit the correct answer within two tries, though in one instance, the bot tried six times before it could proceed, and once it gave the correct answer the first time.”

The attack is the latest to target captchas, the puzzles that websites use to ensure that email and forms are completed by humans rather than automated scripts. Captchas require a person to recognize a series of distorted characters that are hard for computers to read using optical character recognition programs. Audio captchas, which are available in event the user is visually impaired, work in much the same way except that characters are verbally recited amid background static and other noise.

Over the past few years, cybercrooks have used devised attacks on captchas protecting Google, Live.com, sites selling concert tickets and various other web properties. Web masters usually respond by tweaking the puzzles, forcing attackers to find new bypass techniques.

Webroot’s Brandt said it’s the first time he’s heard of an audio captcha being targeted. It remains unclear if the attackers are sending the WAV files to sweat shops where humans then decode the audio puzzles, or if the technique works with the help of speech recognition software.

Once the captcha is solved, the botnet uses a Live.com email address to send spam with a variety of come-ons written with poor English grammar and usage. Our favorite one was “Mamma mia! your grandmother is doing so strange things here! Look at these delineations!”

The spam includes a link to a Yahoo Groups page that uses offers for free porn to coax people into giving up financial information.

A botnet primarily used to spend spam, Pushdo goes by several other names, including Cutwail, Diehard, and Rabbit. Some of the IP addresses used by the audio-captcha buster have been used in the past by the Russian Business Network.

Credit: The Register

Share this item with others:

More on CyberInsecure:
  • Microsoft’s CAPTCHA Under Spammers Attack Again
  • Google’s Blogger CAPTCHA Under Automated Registrations Attack
  • Botnet Spams 60 Billion Emails A Day
  • 3$ for breaking the CAPTCHA
  • Spammers Successfully Avoid IP Address-Based Reputation By Using Free E-mail Providers

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Pushdo Spam Botnet Pierces Microsoft Live Through Audio CAPTCHA

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.