95% of spam monetized through three banks

Posted by   Virus Bulletin on   May 25, 2011

Financial infrastructure possible bottleneck for spammers.

In a recently published paper, researchers from the University of California found that 95 per cent of spamvertised products are monetized through just three banks, thus showing a potential bottleneck that may help in the fight against spam.

The researchers looked at almost one billion spamvertised URLs, or 93 million different ones, on close to 18 million different domains. They retrieved the web pages behind those URLs and classified them into categories and affiliate programs. They then looked at URLs covering the three most prominent types of product advertising spam: pharmaceutical products, replicas and software.

One part of the research concentrated on the network infrastructure used by the spammers. Apart from a registrar, which allocates them the domain, they also need to be provided with DNS and web servers for the URLs on the domain to allow access by their victims.

The research showed that surprisingly little sharing takes place: most registrars only host domains for a small number of affiliate programs and, similarly, most ISPs that deal with spammers provide DNS and web services to only a small number of affiliate programs.

Another part of the research - and one that received a lot of media attention - focused on the processing of payments made to spammers. To this end, the researchers made purchases from a relatively small number of URLs in their collection. While this is certainly controversial (after all, they did send money to the bad guys), they did not pay more than $277 to any affiliate program.

One conclusion they drew was that almost all purchases that were settled led to the delivery of goods, showing that despite their criminal nature, this is something where the spammers can be 'trusted'. Even more interesting conclusions were drawn when they looked at the banks providing the spammers with infrastructure.

It turns out that just a small number of banks act as transaction settlers for the spammers and, not unsurprisingly given the costs involved, spammers rarely switch banks. Just three banks, based in Azerbaijan, St. Kitts & Nevis and Latvia, provide the payment infrastructure for 95% of today's product spam.

It goes too far to say that simply closing down these banks would signal the end of spam, as some reports have suggested. In the past, spammers have shown a surprising ability to bounce back upon being delivered a significant blow. Moreover, a significant portion of spam sent out today does not directly sell goods.

Still, this is very valuable research that does reveal an important bottleneck for spammers. By concentrating on the financial infrastructure, the industry might be able to reduce the harm caused by spammers. A good start has already been made when DnB Nord, the Norwegian parent company of the Latvian bank that allegedly settled spammers' transactions, confirmed it had stopped working with that particular customer.

The full paper can be found in PDF format here while F-Secure said the study's findings confirmed some research they had performed in the past here.

Posted on 25 May 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2016 preview: Wild Android Collusions

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Small Talks return to the Virus Bulletin Conference

Following their success last year, this year a series of "Small Talks" return to the VB2016 conference programme. We are pleased to announce the details of six of these talks, covering subjects that range from the Chinese cybercriminal underground to…

Research shows web security products perform well against exploit kits

Research by Virus Bulletin, in which five web security products were served 54 live exploit kits, shows that the products blocked between 87 and 100 per cent of the kits.

Throwback Thursday: Olympic Games

In 1994, along with the Olympic Games came an Olympic virus, from a group of Swedish virus authors calling themselves ‘Immortal Riot’. We look back at Mikko Hyppönen's analysis in the VB archive.

VB2016 call for last-minute papers opened, discounts announced

Announcing the VB2016 call for last-minute papers and a number of discounts on the conference registration rate.