Subscribe to RSS News Feed
About Spamhaus  |  Press Office  |  FAQs   
Subscription Bombing: COI, CAPTCHA, and the Next Generation of Mail Bombs

2016-09-16 20:31:07 UTC, by Lys Maltice
Recent News Articles

Network Hijacking on the Rise

Subscription Bombing: COI, CAPTCHA, and the Next Generation of Mail Bombs

More Domain Stats: The 10 Most Abused Registrars

SBL/ZEN DNS lookups to return DROP/eDROP status

Spamhaus Presents: The World's Worst Top Level Domains

Verizon Routing Millions of IP Addresses for Cybercrime Gangs

Brazilian internet users suffer SoftLayer's security fail

Network under attack? You might be surprised where that's coming from!

Older News Articles:
Spamhaus News INDEX

Internet harassment is becoming an increasingly ugly and widespread issue, and over the weekend of August 13-14 it spilled into territory we could do something about. After a few weeks of low level activity, over that weekend some unknown cyber criminals launched a targeted attack on over 100 government email addresses, using bots to create mailing list subscription requests at the rate of over 1000 per minute. Effectively, this was a denial of service attack, rendering the government mailboxes useless for considerable time. Over the next couple of months the targets expanded from government addresses to others, some of which were targeted and timed to be especially disruptive.

Examples of Recent Subscription Bombs

  • 22K signups at a single ESP, targeting 3000 different domains, resulting in a volume of sometimes over 100 messages a minute to some addresses.
  • One company saw nine specific addresses signed up over 9,000 times over the course of two weeks, creating 81,000 confirmation emails.
  • Brian Krebs was targeted as well, receiving a new subscription confirmation message every two or three seconds.
  • Word to the Wise was also attacked, after publishing several articles about the subject (links below).
  • Ultimately, on August 19, Spamhaus itself was hit with a fairly small attack.

Spamhaus Response

The first attack we detected was on August 12. Over that weekend, we began to create listings of the IPs from the largest sources of list bomb mail in an attempt to mitigate the damage. This is not something we did happily, but it was necessary.

Bots were - and are - being used to sign up innocent email addresses through open or poorly secured web sign-up forms in high volumes. Some subscriptions were added at ESP interfaces, many more were introduced at diverse list-owner locations around the web. These signups were made possible by the fact that many web forms use Single Opt-In (SOI) and accept all subscriptions without any verification, though in this case even using Confirmed Opt-In (COI) didn't help much because the volume of confirmation emails alone was enough to cause a substantial problem. In fact, many of the lists that were victimised had already been using COI.

It is interesting and concerning that the attacks were not all composed of list subscription responses; half consisted of account sign ups at WordPress sites, so the emails were also seemingly legitimate, as they contained the new account credentials. This means the onus of stopping this kind of attack is not only on ESPs or mailing list owners. It is on everyone that has any sort of web-based signup that results in an email being sent: somebody clearly spent a great deal of time assembling URLs of mailing lists, and of account sign up pages, and has written a script to submit addresses to them at speed. We suspect that this was a test run for a tool that will will soon be offered for sale in the 'Underground Economy': Mail-bombing as a Service - MaaS.

ESP Response

Efforts are ongoing to help ESPs clean up, and there has been a significant community effort among the ESPs that we feel is eminently praiseworthy. Lists of email addresses used for sign-ups were compiled and shared, as were lists of IPs known to be doing the deed. A Slack channel was created by Word to the Wise to facilitate communication between the interested parties. The cleanup has been quick and efficient in most cases, and we are confident that these ESP's will be proactively pushing their customers to secure their various online sign up forms.

ESPs are aware that these attacks are on-going, and that measures to secure sign-up forms must continue to be implemented.

How Does One Protect Against This?

The single best thing that can be done to secure a form and avoid becoming an attack vector is to put a CAPTCHA on it. (Google's ReCAPTCHA is a free service and will foil most bots.) Even using COI in this situation is not sufficient, as the sheer volume of confirmation emails can be completely overwhelming. Use CAPTCHA plus COI to protect your mailing list subscription form!

Internet harassment is not going away. In fact, it is becoming a bigger and bigger problem; the fact that this first wave has died down should not be a reason to become complacent. This situation should be viewed as a call to arms by all senders, ESPs, and any businesses that utilise online sign up methods. They need to neutralise the attack vectors, educate their customers, tighten their policies and ensure they cannot be used as a conduit for personal or corporate harassment or DDoS attacks meant to disrupt online activities.

Additional Reading

Word to the Wise: Subscription bombing, ESPs and Spamhaus
Word to the Wise: Spamhaus comments on subscription attack
Word to the Wise: Ongoing subscription attack
Krebs on Security: Massive Email Bombs Target .Gov Addresses
Oracle Marketing Cloud: Why So Many Email Marketers Are Worried About Spamhaus
SendGrid: Email Subscription DDOS Attacks: Why You Should Secure Your Email Signup Forms Now
The Magill Report: Time to Switch to COI

Spamhaus Information

Press Office
Spamhaus News Index
Spamhaus in the media
About Spamhaus
Spamhaus Official Statements
Article Information

Permanent link to this news article:
Subscription Bombing: COI, CAPTCHA, and the Next Generation of Mail Bombs

Subscribe to RSS News Feed
Spamhaus News Quotes

Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record.
© 1998-2016 The Spamhaus Project Ltd. All rights reserved.
Legal  |  Privacy