Live Mail CAPTCHA system bypassed

Posted by   Virus Bulletin on   Feb 11, 2008

Spammers use botnet to register accounts on popular free webmail service.

Spammers have written a program that cracks the CAPTCHAS used by the Windows Live Mail registration system. The program, thought to have been installed on a large botnet of compromised systems, enables the automated creation of email accounts which can then be used to send spam.

Windows Live Mail, the successor of Hotmail, is a popular free webmail service owned by Microsoft. Like most free webmail services, it uses a CAPTCHA system to prevent automatic account registration. CAPTCHA images contain a simple code that needs to be entered correctly into a form on the web page to provide proof that the page is being viewed by a genuine person. The images are distorted in a way that supposedly prevents computer recognition, while allowing human viewers to decipher them and enter the codes they display.

Compromised systems making up a large botnet are thought to be running trojans which run through the registration process for Windows Live Mail accounts. When presented with the CAPTCHA, the image is sent off to a central server which attempts to decode it and return the result. Although the decipher technique is only successful around 35 per cent of the time, the fact that large numbers of infected systems are running repeated attempts means that the botnet's controllers are yielding a high number of new accounts to use for spamming.

Windows Live Mail is a particularly valuable resource for spammers - it provides free access to powerful mailing resources, and with its broad popularity and large legitimate user base, it provides a domain address that is unlikely to be blocked by spam filters. After reports in January of Yahoo!'s CAPTCHA system being cracked, this is another blow for the anti-spam world.

More detail can be found at The Register here and at Websense here.

Posted on 11 February 2008 by Virus Bulletin



Latest posts:

VB2019 paper: Operation Soft Cell - a worldwide campaign against telecommunication providers

Today we publish the VB2019 paper by Cybereason researchers Mor Levi, Amit Serper and Assaf Dahan on Operation Soft Cell, a targeted attack against telecom providers around the world.

VB2019 paper: A study of Machete cyber espionage operations in Latin America

At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the…

VB2019 paper: The push from fiction for increased surveillance, and its impact on privacy

In a paper presented at VB2019 in London, researchers Miriam Cihodariu (Heimdal Security) and Andrei Bogdan Brad (Code4Romania) looked at how surveillance is represented in fiction and how these representations are shaping people's attitudes to…

VB2019 paper: Oops! It happened again!

At VB2019 in London industry veterans Righard Zwienenberg and Eddy Willems took a detailed look at the relationship between past and current cyber threats. Today, we publish both their paper and the recording of their presentation.

Job vacancy at VB: Security Evangelist

Virus Bulletin is recruiting for a person to be the public face of the company

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.