The "No Network is 100% Secure" series
- Electronic Mail SPAM -
A White Paper


All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants

Contact Us

What is SPAM?: It is widely believed the term spam is derived from the 1970 SPAM sketch of the BBC television comedy series "Monty Python's Flying Circus". The sketch is set in a cafe where nearly every item on the menu includes SPAM luncheon meat. As the waiter recites the SPAM-filled menu, a chorus of Viking patrons drowns out all conversations with a song repeating "SPAM, SPAM, SPAM, SPAM... lovely SPAM, wonderful SPAM", hence "SPAMming" the dialog. The excessive amount of SPAM mentioned in the sketch is a reference to British rationing during World War II. SPAM was one of the few meat products that was excluded from rationing, and hence was widely available.

In it's purest form, SPAM is any unwanted message, typically sent via electronic e-mail. Multiple postings (e.g. on usenet newsgroups or forums) can also be referred to as SPAM. For the purpose of this white paper, SPAM will mean unwanted, bulk e-mail sent for devious and often for criminal purposes. Other forms of SPAMMING are usually more accurately defined as hacking and are accomplished by breaking into a computer system, typically a web server.

Why is there so much SPAMMING going on?: Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists. Additionally, it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.

Is SPAM a security concern?: The short answer is no, but with caveats. Very few people these days are dumb enough to actually buy Viagra over the Internet or fall for erectile disfunction scams by responding to a piece of SPAM. However, SPAM is the delivery method for many viruses and other malware. As SPAMMERS become more sophisticated, SPAM with forged headers has been responsible for many "phishing" campaigns that cyber-criminals use to gain access to user accounts and computer services. The end goal for phishing is usually to gain access to credit card numbers, bank accounts, social security numbers and so forth. Phishing scams seek to trick users into going to a bogus but legitimate looking web site to enter their user names, passwords, SSNs and so forth. While Employee identity theft and these types of crimes may not be the direct concern of IT Managers, there are many reasons why you would want to do everything possible to keep SPAM out of your enterprise.

SPAM is also used as a method to harvest e-mail addresses, infect computers with bots and trojans and many other bad things that you do not want to happen to computers that are in your charge.

How do I stop SPAM from getting into my enterprise?: Volumes have been written on this subject so this white paper will just hit the high points. The short answer is that completely eliminating SPAM is impossible under today's technology. Additionally, legislation and enforcement has so far been totally ineffective in abating these types of criminal activities. The reasons for this are beyond the scope of this paper.

However, there are a few relatively simply and often common sense things you can do to at least reduce your vulnerability to SPAM. It is an assumption that the IT Manager has already implemented anti-virus software on every computer in the network. This is an absolute minimum precaution. It is also assumed that virus definitions are kept up to date.

Important best practices: You can remind users to never open attachments unless they are sure of the sender until you are blue in the face. But the fact is that many of your users are just not very technically savvy. So while training and education is important, the best strategy is to prevent SPAM from ever reaching their mailbox in the first place. If you don't do this, you WILL spend a lot of time and energy dealing with viruses, bots, trojans, hack attemps as so on. SPAM is definitely a situation where you can either invest your time being proactive about it or you can deal with fire after fire, reacting every time some user opens up an e-mail attachment or goes to a URL that they "thought" was okay. You only have to pick up the newspaper or turn on the news to learn about the lastest company to be "knocked off the air" by cyber-criminals. I'm sure the IT guys at these companies have some 'splaining to do....

First steps: For SPAM to be delivered, there has to be a legitimate e-mail address to send SPAM to. Therefore, in my opinion, task number one is to not provide SPAMMERS with e-mail addresses to send to. Duh.... So how do we accomplish this? There are many things that can be done to thwart e-mail address harvesters. Implementing policies and procedures that prohibit personal use of company equipment, including company e-mail addresses, for example. Changes to the way e-mail addresses are displayed on web sites (including Internet forums and e-commerce sites that are accessed by employees), for another. Requiring "hardened" usernames so that SPAMMERS can't guess e-mail addresses. That is, Joseph.Jones@your_company.com versus joe or jones @your_company.com. As you can see, there's lots that can be done that's easy and inexpensive to implement but will make a BIG difference in SPAM reduction. Easyrider LAN Pro consulting services can be a huge help in identifying lots of things that data centers are doing that inadvertently promote incoming SPAM. We are always happy to talk to IT Managers about this.

What else?: So the barn door is already open and SPAMMERS have lots of addresses in your domain to SPAM already. What else can be done? Software tools can be a big help too. A great deal of SPAM these days is sent from computers that are infected with bots and in some cases are running as open relays. That is to say that the SPAM is coming from computers that aren't legitimate MX mail servers at all. There are several methods to check incoming mail to see if it came from an open relay, a legitimate MX server or from an IP that is blacklisted.

There are also ways to look at the content of incoming e-mail to see if if has SPAM "signatures". Spamassassin is very popular for doing this and it's free! Servers can also be set up to challange incoming mail by replying with a verification e-mail that the sender must acknowledge before their address is "whitelisted". There is some debate on how effective this approach is but it's still an available option that you may want to take advantage of.

If you are a company, you may want to block ALL e-mail from Google (gmail), Hotmail, Yahoo and so forth since these are clearly not business e-mail addresses. Google and others have done very little to prevent SPAMMERS from using their services to SPAM the Planet. Personally, I block everything from Google, Theplanet and RIPE IP addresses. In your business environment, you may not be able to be quite that aggressive. But personally, I would not hesitate to blacklist scumbag ISPs who host SPAMMERS and Hackers, from my entire network, at the border router. If one of their customers doesn't like having their e-mail blocked, they can vote with their dollars and move to a more responsible ISP. I also block everything from Russian and Nigerian IP address blocks.

As stated earlier, SPAM is a serious, complex and detailed problem. This white paper barely scratches the surface on this issue but we hope you find the information here to be helpful and informative. Easyrider LAN Pro is happy to do consulting work for IT Managers and companies that would like to tighten up their computing environment and who would like to see a lot less SPAM coming into their environment. We often receive consulting inquiries right AFTER a high visibility, expensive, painful intrusion event takes place. But you don't have to wait until your local TV station is interviewing the company president to find out the details about how your data center was attacked before you call us. Level zero in the Information Technology Service Management (ITSM) is chaos mode. You'd like to be way more proactive than that, right?

Next in the security white paper series:

Virus White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Shelfware White Paper



Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro