Snowshoe spam has a "small footprint" -- it is sent is small, semi-targeted batches intended to sit below the trigger threshold for cloud-email spam filters, which treat floods of identical (or near-identical) messages as a solid indicator of spam.
Researchers at Talos, a division of Cisco, coined the term to refer to some French spam they caught trying to steal passwords from French Itunes users. Rather than going out in batches of tens of thousands or millions, this email went out in a trickle of 5,000 messages targeted to French users alone. Another run on Italian users comprised just 169 messages. Talos's Craig Williams says that snowshoe messages account for 15% of all global spam and have doubled in number in the past two years.
Snowshoe attacks continue to cause "severe" problems for spam filters, Cisco said. It's one of many vexing problems for the industry. Global spending on cyber-security technology is projected to surpass a record $83.6 billion in 2015, according to an estimate by researcher Gartner.
A separate attack, also in October, involved 169 e-mails targeting Italian PayPal users, Agari said. The messages came from a data-hosting company in France that hadn't been included on major blacklists before the attack. These e-mails, like most effective spam, didn't include attachments, which can be quickly scanned and flagged as malicious. Because Web links take longer to crawl, many filters don't bother.
E-Mail Spam Goes Artisanal
(Image: Snowshoe (PSF), public domain)
After decades of back-and-forth over internet freedom, China has figured out a method for allowing people to use the internet for social and business purposes, but not for political reform -- a combination of huge boiler-rooms full of censors, centralization of internet services under tight government control, and control over standards to ensure that surveillance […]
In one week, an EU committee will vote on a pair of extreme copyright proposals that will ban linking to news articles without permission, and force internet platforms to spy on all the pictures, text, video, audio and code their users post, sending it to AIs designed to catch copyright infringement and automatically censor anything […]
At the urging of Uganda's corrupt dictator Yoweri Museveni, the Ugandan parliament has enacted legislation imposing a daily tax on anyone using social media platforms; Museveni said the measure would curb "gossip," while Matia Kasaija claimed it would fund security and electrification efforts.
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]