18
Spam & Spam Control Prepared by: Waleed Omar [email protected] CISSP, CCDA, MCSE, MCT, Exchange-MVP.

Spam (Security Awareness Session)

Embed Size (px)

Citation preview

Page 1: Spam (Security Awareness Session)

Spam & Spam Control

Prepared by: Waleed [email protected], CCDA, MCSE, MCT, Exchange-MVP.

Page 2: Spam (Security Awareness Session)

Contents

1. Facts & Statistics2. Cost of Spam3. Defining Spam4. Sending Mechanisms5. Spammer Tricks6. Techniques for Identifying Spam7. The tools Microsoft uses to fight spam8. Conclusion

Page 3: Spam (Security Awareness Session)

Facts & Statistics

• More than 97 % of e-mail messages sent over the internet are unwanted (have malicious attachments or are phishing attacks or spam)

• 349.6 Billion in 2008 192 % increase in Spam over the past year

*Source: Microsoft Security intelligence Report Volume 6 (July – December 2008)

Page 4: Spam (Security Awareness Session)

Cost of Spam

• Spam costs U.S. companies US$ 712 per employee each year.

Users are spending 3 minutes identifying average of 21 unwanted messages and deleting each spam e-mail, which translates into an annual cost of $70 billion to all US businesses.

• Around 60 % of the email processing time is wasted in receiving Spam.

*nucleusresearch.com – ferriys.com

Page 5: Spam (Security Awareness Session)

How to defeat spam

1. Security Awareness2. Tool3. Legislations

Page 6: Spam (Security Awareness Session)

Spam Categories

• Fake pharmaceuticals.• Fake fashion items.• Pornography and prostitution.• Stock kiting.• Phishing.• Trojan horses.• Backscatter.• ignorant marketers.

Page 7: Spam (Security Awareness Session)

• Directory Harvest Attack (DHA)• Chain Mails• Social engineering• Mining message boards and chat rooms

Valid e-mail account!

Page 8: Spam (Security Awareness Session)

Sending Mechanisms

• Open proxies• Free email services• Other free services• Stolen Netblocks• Botnets

Page 9: Spam (Security Awareness Session)

Techniques for Identifying Spam

• Reputation of the sending IP address• Profiling the sender’s operating system• Standards compliance• Greylisting • Greet pause• Format standards compliance.• Statistical content analysis (Bayesian) • Throttling

Page 10: Spam (Security Awareness Session)

Spammer Tricks

• HTML tricks. • Bayesian poisoning. • Content morphing. • Images and other attachments• Forcing secondary MX. • Countering IP reputation• Hiding the call-to-action.

Page 11: Spam (Security Awareness Session)

The tools Microsoft uses to fight spam

• Intelligent Message Filter (IMF)• Sender ID Framework (SIDF)• Outlook 2007 Email Postmark• Microsoft Forefront Security for Exchange• Exchange Hosted Filtering

Page 12: Spam (Security Awareness Session)

Intelligent Message Filter (IMF)

Page 13: Spam (Security Awareness Session)

Exchange 2007 AntiSpam Agents

Page 14: Spam (Security Awareness Session)

Exchange 2007 AntiSpam Agents

Page 15: Spam (Security Awareness Session)

"I only send mail from these machines. If any other machine claims that I'm sending mail from there, they're lying.“

Sender ID Framework

Page 16: Spam (Security Awareness Session)

Exchange Hosted Filtering

Page 17: Spam (Security Awareness Session)

FSE Forefront Security for Exchange

1. Microsoft IP Reputation filter service and automated updates.

2. Automated updates for Microsoft SmartScreen spam heuristics, Phishing Websites, and intelligent message Filter (IMF).

3. Targeted Spam signature data and automatic updates to identify spam campaigns.

Page 18: Spam (Security Awareness Session)

Thanks for your attention

Waleed Omar [email protected] CISSP, CCDA, MCSE, MCT, Exchange-MVP.