The economics of spam

Note: These lecture notes were slightly modified from the ones posted on the 6.858 course website from 2014.

Economics of cyber attacks

Up to this point, we've dealt with the technical aspects of security (buffer overflows, the same-origin policy, Tor, etc).

For today's lecture, we'll focus on attacks that do involve a significant economic component.

Who buys exploits from cyber arms dealers? Governments? Companies (e.g., for "hack-back" schemes)? . . .?

There's a marketplace for buying and selling all kinds of resources that attackers can use for evil purposes.

Spam ecosystem

This paper focuses on the spam ecosystem (in particular, the sales of drugs, knock-off goods, and software). There are three main steps:

  1. Advertising: Somehow getting a user to click on a link.
  2. Click support: Presenting a web site that will be the target of a click.
  3. Realization: Allowing the user to buy something, send money, and then receive a product.

Ultimately, money comes from the last part in this chain, when the user buys something.

Next, we'll discuss these three steps in detail, and look at possible ways to disrupt them.

Advertising: How do you get a user to click on a link?

Botnets are often used to send spam.

How much does it cost to get your malware installed on end-hosts?

What does the command and control architecture look like?

Compromised webmail accounts can also be used to send spam.

Why are webmail accounts so cheap? What happened to CAPTCHAs?

Click support: The user contacts DNS to translate a hostname into an IP address

Then, the user contacts the associated web server. So, the spammer needs to:

  1. Register a domain name.
  2. Run a DNS server.
  3. Run a web server.

Q: Why do spammers bother with domain names? Why not just use raw IP addresses to serve content?

Redirect sites:

In some cases, a single affiliate provider will run some or all of these services.

Q: Can't law enforcement just take down the affiliate program?

Q: How difficult is it to take down individual domain names or web servers?

What happens during the realization phase?

  1. User pays for goods.
  2. User receives goods in the mail (or downloads software).

Payment protocol: almost invariably credit cards. Credit card info travels along this flow:

    Customer
      |---->Merchant
             |----> Payment processor (helps the
                     |  merchant deal with the
                     |  payment protocol)
                     |
                     |-->Acquiring bank (merchant's)
                            |-->Association network
                                  | (e.g., Visa)
                                  |
                                  |---> Issuing bank
                                        (customer's)

For physical goods, the supplier typically ships the goods directly to purchaser (this is called "drop shipping").

Q: Why do spammers properly classify their credit card transactions?

Q: Why do spammers actually ship the goods?

Since this paper was published, credit card networks have taken some action.

Ethics

Does this paper raise ethical concerns? Are the authors supporting the spammers by purchasing their goods?

Some companies have launched "hack-back" campaigns to retaliate against theft of intellectual property, or to stop botnets involving their machines.

References