<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://webplanet.ru" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Вебпланета - Russian spam bots crack Google Mail captcha - Comments</title>
 <link>http://webplanet.ru/english/2008/02/15/google_captcha_en.html</link>
 <description>Comments for &quot;Russian spam bots crack Google Mail captcha&quot;</description>
 <language>ru</language>
<item>
 <title>script]]&gt;alert(&#039;xss&#039;)/script]</title>
 <link>http://webplanet.ru/english/2008/02/15/comments/google_captcha_en.html#comment-173012</link>
 <description>&lt;p&gt;script]]&amp;gt;alert(&#039;xss&#039;)/script]]&amp;gt;&lt;/p&gt;
</description>
 <pubDate>Mon, 26 Oct 2009 21:17:50 +0300</pubDate>
 <dc:creator>Гость</dc:creator>
 <guid isPermaLink="false">comment 173012 at http://webplanet.ru</guid>
</item>
<item>
 <title>Russian spam bots crack Google Mail captcha</title>
 <link>http://webplanet.ru/english/2008/02/15/google_captcha_en.html</link>
 <description>&lt;p&gt;The protection system which prevents the multiple automatic registration of fraudulent accounts at GMail is cracked following the same breakage in Yahoo! and Microsoft Live webmail services. The example of spambot work is published by Russian security blog &lt;noindex&gt;&lt;a href=&quot;http://urs-molotoff.blogspot.com/2008/02/capcha-google-mail.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;urs-molotoff.blogspot.com&lt;/a&gt;&lt;/noindex&gt;. The bot goes wild with a trojan. After some user&#039;s computer is infected, the bot grabs GMail captcha and sends it to a special server where the captcha is recognized and the result is send back to the bot, so it can register a new Gmail account and start spamming. &lt;/p&gt;
&lt;p&gt;The address of the spam server is hidden in this example but the authors of the security blog told Webplanet that the bot &quot;is connected to Russian-speaking site&quot;.&lt;/p&gt;
&lt;p&gt;In January, some group of &quot;Russian researchers&quot; showed how &lt;noindex&gt;&lt;a href=&quot;http://network-security-research.blogspot.com/&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;to break Yahoo! captcha&lt;/a&gt;&lt;/noindex&gt; with the recognition rate about 35%. A couple of weeks later Windows Live captcha &lt;noindex&gt;&lt;a href=&quot;http://www.theregister.co.uk/2008/02/08/microsoft_captcha_buster/&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;was cracked, too&lt;/a&gt;&lt;/noindex&gt;. These protection systems from Microsoft, Yahoo and Google where considered pretty safe so anti-spammers didn&#039;t list these mail services in their &quot;black lists&quot;. Now they got a problem: &quot;In the past week or so, Websense antispam filters have gone from blocking fewer than 100 Windows Live accounts per day to a number that&#039;s in the thousands&quot;. &lt;/p&gt;
&lt;p&gt;Some people say more spam &lt;noindex&gt;&lt;a href=&quot;http://blogs.msdn.com/tzink/archive/2008/02/15/was-a-captcha-broken.aspx&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;comes now from GMail&lt;/a&gt;&lt;/noindex&gt;, too.  We are looking forward to see more sophisticated Turing tests on the Web. Or it&#039;s about time to use Philip Dick&#039;s tests for androids? Google Androids, in this case.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://webplanet.ru/english/2008/02/15/google_captcha_en.html&quot;&gt;Далее&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://webplanet.ru/english/2008/02/15/google_captcha_en.html#comment</comments>
 <pubDate>Fri, 15 Feb 2008 19:11:54 +0300</pubDate>
 <dc:creator>translator</dc:creator>
 <guid isPermaLink="false">18346 at http://webplanet.ru</guid>
</item>
</channel>
</rss>
