95% of spam monetized through three banks

Posted by   Virus Bulletin on   May 25, 2011

Financial infrastructure possible bottleneck for spammers.

In a recently published paper, researchers from the University of California found that 95 per cent of spamvertised products are monetized through just three banks, thus showing a potential bottleneck that may help in the fight against spam.

The researchers looked at almost one billion spamvertised URLs, or 93 million different ones, on close to 18 million different domains. They retrieved the web pages behind those URLs and classified them into categories and affiliate programs. They then looked at URLs covering the three most prominent types of product advertising spam: pharmaceutical products, replicas and software.

One part of the research concentrated on the network infrastructure used by the spammers. Apart from a registrar, which allocates them the domain, they also need to be provided with DNS and web servers for the URLs on the domain to allow access by their victims.

The research showed that surprisingly little sharing takes place: most registrars only host domains for a small number of affiliate programs and, similarly, most ISPs that deal with spammers provide DNS and web services to only a small number of affiliate programs.

Another part of the research - and one that received a lot of media attention - focused on the processing of payments made to spammers. To this end, the researchers made purchases from a relatively small number of URLs in their collection. While this is certainly controversial (after all, they did send money to the bad guys), they did not pay more than $277 to any affiliate program.

One conclusion they drew was that almost all purchases that were settled led to the delivery of goods, showing that despite their criminal nature, this is something where the spammers can be 'trusted'. Even more interesting conclusions were drawn when they looked at the banks providing the spammers with infrastructure.

It turns out that just a small number of banks act as transaction settlers for the spammers and, not unsurprisingly given the costs involved, spammers rarely switch banks. Just three banks, based in Azerbaijan, St. Kitts & Nevis and Latvia, provide the payment infrastructure for 95% of today's product spam.

It goes too far to say that simply closing down these banks would signal the end of spam, as some reports have suggested. In the past, spammers have shown a surprising ability to bounce back upon being delivered a significant blow. Moreover, a significant portion of spam sent out today does not directly sell goods.

Still, this is very valuable research that does reveal an important bottleneck for spammers. By concentrating on the financial infrastructure, the industry might be able to reduce the harm caused by spammers. A good start has already been made when DnB Nord, the Norwegian parent company of the Latvian bank that allegedly settled spammers' transactions, confirmed it had stopped working with that particular customer.

The full paper can be found in PDF format here while F-Secure said the study's findings confirmed some research they had performed in the past here.

Posted on 25 May 2011 by Virus Bulletin



Latest posts:

WannaCry shows we need to understand why organizations don't patch

Perhaps the question we should be asking about WannaCry is not "why do so many organizations allow unpatched machines to exist on their networks?" but "why doesn't patching work reasonably well most of the time?"

Modern security software is not necessarily powerless against threats like WannaCry

The WannaCry ransomware has affected many organisations around the world, making it probably the worst and most damaging of its kind. But modern security is not necessarily powerless against such threats.

Throwback Thursday: CARO: A personal view

This week sees the 11th International CARO Workshop taking place in Krakow, Poland – a prestigious annual meeting of anti-malware and security experts. As a founding member of CARO, Fridrik Skulason was well placed, in August 1994, to shed some light…

VB2016 paper: Uncovering the secrets of malvertising

Malicious advertising, a.k.a. malvertising, has evolved tremendously over the past few years to take a central place in some of today’s largest web-based attacks. It is by far the tool of choice for attackers to reach the masses but also to target…

Throwback Thursday: Tools of the DDoS Trade

As DDoS attacks become costlier to fix and continue to increase in both number and diversity, we turn back the clock to 2000, when Aleksander Czarnowski took a look at the DDoS tools of the day.