95% of spam monetized through three banks

Posted by   Virus Bulletin on   May 25, 2011

Financial infrastructure possible bottleneck for spammers.

In a recently published paper, researchers from the University of California found that 95 per cent of spamvertised products are monetized through just three banks, thus showing a potential bottleneck that may help in the fight against spam.

The researchers looked at almost one billion spamvertised URLs, or 93 million different ones, on close to 18 million different domains. They retrieved the web pages behind those URLs and classified them into categories and affiliate programs. They then looked at URLs covering the three most prominent types of product advertising spam: pharmaceutical products, replicas and software.

One part of the research concentrated on the network infrastructure used by the spammers. Apart from a registrar, which allocates them the domain, they also need to be provided with DNS and web servers for the URLs on the domain to allow access by their victims.

The research showed that surprisingly little sharing takes place: most registrars only host domains for a small number of affiliate programs and, similarly, most ISPs that deal with spammers provide DNS and web services to only a small number of affiliate programs.

Another part of the research - and one that received a lot of media attention - focused on the processing of payments made to spammers. To this end, the researchers made purchases from a relatively small number of URLs in their collection. While this is certainly controversial (after all, they did send money to the bad guys), they did not pay more than $277 to any affiliate program.

One conclusion they drew was that almost all purchases that were settled led to the delivery of goods, showing that despite their criminal nature, this is something where the spammers can be 'trusted'. Even more interesting conclusions were drawn when they looked at the banks providing the spammers with infrastructure.

It turns out that just a small number of banks act as transaction settlers for the spammers and, not unsurprisingly given the costs involved, spammers rarely switch banks. Just three banks, based in Azerbaijan, St. Kitts & Nevis and Latvia, provide the payment infrastructure for 95% of today's product spam.

It goes too far to say that simply closing down these banks would signal the end of spam, as some reports have suggested. In the past, spammers have shown a surprising ability to bounce back upon being delivered a significant blow. Moreover, a significant portion of spam sent out today does not directly sell goods.

Still, this is very valuable research that does reveal an important bottleneck for spammers. By concentrating on the financial infrastructure, the industry might be able to reduce the harm caused by spammers. A good start has already been made when DnB Nord, the Norwegian parent company of the Latvian bank that allegedly settled spammers' transactions, confirmed it had stopped working with that particular customer.

The full paper can be found in PDF format here while F-Secure said the study's findings confirmed some research they had performed in the past here.

Posted on 25 May 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.