funsec mailing list archives

Re: Scam Uses Striptease To Break CAPTCHAs


From: "Paul Ferguson" <fergdawg () netzero net>
Date: Thu, 1 Nov 2007 22:19:41 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- "Young, Keith" <Keith.Young () montgomerycountymd gov> wrote:

http://www.enterprise-security-today.com/story.xhtml?story_id=56423

<snip>
Trend Micro researchers say the scam appears to be isolated for now to
spammers trying to register bogus e-mail addresses and flood chat rooms
with unwanted pitches. But they worry schemes to infiltrate financial
institutions could soon appear. Spammers might be using the results to
write a program to automatically bypass CAPTCHA systems.
</snip>

Fergie, any samples that you want to share?

*smile*


If you're curious, they never actually get completely naked. ;-)

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHKlD2q1pz9mNUZTMRAiMgAJ9gYh5CzL0nJ8DAync/BbbIogopuwCfaQvr
OP58NSQz6doUhr1/UKVUw+0=
=rccH
-----END PGP SIGNATURE-----


--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/


_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: