Unified Communications

04:00 AM
Connect Directly
RSS
E-Mail
50%
50%

Reality IT: The Burden of Spoof

Take a closer look at the causes of spam proliferation and learn some steps that enterprises can take to keep it to a minimum.

It seems that the spammers' messages had generated thousands of invalid address messages, recipient autoreplies and responses from junk-mail checkers requesting validation of the sender's identity. Many companies don't have a catch-all e-mail address to avoid these types of replies--but it's a necessity in our business, so we don't have a choice.

What Now?

Bucky and his crew checked the headers of many of the messages. Some of the bounces included the original message with the return message, but the spammers were using forged IP addresses, so it was difficult to track the messages' origin. The messages did include "unsubscribe" links, but they went to a throwaway e-mail address from one of the free public services. The penny stocks existed--we called some of the firms involved, but of course, they disavowed any knowledge of the scam.

In our view, there was more to the situation than just dealing with annoying e-mail messages--it was akin to the identify theft of our company name. Bucky called a few cybercrime contacts, but their response was not swift.

Our first action was to install a lengthy content filter for our catch-all e-mailbox. This filter automatically deletes e-mail with subject lines that contain certain keywords, such as auto, block, confirm, delivery, error, fail, nondelivery, problem, reject, return, undeliverable and unknown. We even added an international flavor to the filter, including terms like falshe, filtro and zustellungsfehler (don't ask me exactly what those mean, but you get the idea). We still get a ton of bounces and replies to spoofers, but the content filter pushes them aside. Ignorance is bliss.

Previous
1 of 3
Next
Comment  | 
Print  | 
More Insights
Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Twitter Feed