Spammers have been including images in their email to evade anti-spammers.
Anti-spammers have been using OCR to identify spammy words in images.
Spammers have recently come up with tricks to work around OCRs,
by doing steganography with animated GIF images.
One approach they're taking is to build the real image progressively,
first drawing a background, then drawing parts of the image
(one spammer uses transparent pixels to do parts of it, showing dark parts of background), then waiting a long time and drawing a blank page in case anything's checking the final image.

http://www.networkworld.com/community/?q=node/8977

Spammers dodging OCR with .gif 'cut-and-paste'

By Paul McNamara on Fri, 10/20/2006 - 2:11pm

Spammers have begun slipping their junk past optical character recognition (OCR) software through a variety of animated .gif "cut-and-paste" techniques, says John Graham-Cumming, an anti-spam activist who maintains The Spammers' Compendium and also founded Electric Cloud.

On blog posts this week -- here and here
        http://www.jgc.org/blog/2006/10/why-ocring-spam-images-is-useless.html
        http://www.jgc.org/blog/2006/10/spam-image-that-slowly-builds-to.html
-- Graham-Cumming explains two of the OCR-evading methods that were brought to his attention by Nick FitzGerald, a New Zealand anti-spam consultant and regular contributor to The Spammers' Compendium. (It being 3 a.m. in New Zealand, I'm relying on Graham-Cumming's account here.) ... (Update: FitzGerald explains his advantage.)

"I don't know how widespread it is," Graham-Cumming told me this afternoon. "(The second spam message) was targeted for this Wednesday, so I think it's probably pretty new."

The second of the two techniques takes animated .gif spam "to a new level," he said on his blog.

From the blog post: "The first image is the .gifs background and is displayed for 10ms then the second image is layered on top with a transparent background so that the two images merge together and the image the spammer wants you to see appears. That image remains on screen for 100,000 ms (or 1 minute 40 seconds). After that the image is completely blanked out by the third frame.

"My favorite touch is that it's not the entire image that's transparent, not even the white background, but just those pixels necessary to make the black pixels underneath show through. If you look carefully above you can see that some of the pixels appear yellow (which is the background color of this site) indicating where the transparency is."

In our interview, Graham-Cumming belied more than begrudging admiration for what this spammer has achieved.

"What's really neat about what this guy has done is that he takes a piece of text and he randomly kills pixels in it so that each frame of this thing is unreadable," he told me. "But when you merge them together, you get a readable piece of text. It is immensely clever. He's used animation with transparency in .gif so what happens is that although this is actually animated you don't see the animation because the two frames which have got the pixels killed on them are animated together so fast … that it looks like a static image."

Despite the fact that Graham-Cumming headlined his blog item "Why OCRing spam images is useless," he tempered that assessment in our talk.

"Saying OCR is useless is an overstatement, of course," he said. "There will be some value in OCRing because the history of spam shows that there are bleeding-edge spammers who fight to get through every filter and there's a large pool of spammers who use out of date software, essentially, so it's always worth going with techniques that worked a few months ago. … The problem with OCR is that it's very expensive to do in terms of CPU and so that's why it hasn't been rolled out widely. It's pretty clear that spammers are thinking about this. That (animated .gif) technique and the previous one I showed in the previous blog entry both make OCRing difficult."

Coincidentally, the two anti-spammers involved here had recently been discussing the possibility of such techniques emerging.

"What's amazing about this one is that (FitzGerald) and I had gone back and forth in a conversation about -- 'You know what spammers could do, is something like this.' We had anticipated that something like this was going to happen; the particular technique is very close to what we had been discussing and (FitzGerald) actually sent me an e-mail today saying, 'Look at this one, maybe they're reading our mail.' "




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to