You are on page 1of 9

SPAMMING

BY- LAKSH, ARNAV, AND DAIVIK


AGENDA
• What is spamming
• Why is spamming used
• How to identify spam
• How to prevent spamming
• What are the different techniques used by spammers
WHAT IS SPAMMING?
Spam is a form of email or message which is used to send to
different accounts and in general contains advertising about
any product or services. But the real problem is when they
contain malwares that can damage the user’s data.

Generally, they are sent to a massive list of emails for the main
purpose that a small percentage of users might open them and
respond. They are used to such treatment because they are
cheap in infrastructure and investment, not too much time
consuming and simple.
WHY IS SPAMMING USED?

• Spammers try to promote and sell


questionable goods, make false claims
and deceive recipients into believing
something that's not true.
• Sending emails using a fake brand name
is known as email spamming. It deceives
the receiver into believing that an email
came from someone they know or can
trust. Typically, it's a phishing assault
tool used to spread malware, access your
internet accounts, or steal money.
HOW TO IDENTIFY SPAM
• For spam, usually the messages from brands or so are altered
and are seem too simple. This means they can be and most
probably are dangerous and specifically may be targeted to you
this can lead to serious issues and constitute a serious
security hazard
HOW TO PREVENT SPAMMING
• The reality is that it's impossible to stop email spoofing
because the Simple Mail Transfer Protocol (SMPT), which is the
foundation for sending emails, doesn't require any
authentication. That's the jeopardy of the technology. There are
some additional countermeasures developed to counter email
spoofing. Still, the success rate will depend entirely on whether
your email service provider implemented them.
HOW TO PREVENT SPAMMING
• As an ordinary user, you can stop email spoofing by choosing a secure
email provider and practicing good cybersecurity hygiene:
• Use throwaway accounts when registering in sites. That way, your private
email address won't appear in shady lists used for sending spoofed email
messages in bulk.
• Make sure that your email password is strong and is complex enough.
That way, it will be harder for cybercriminals to get into your account and
send misleading messages to your contacts.
• Inspect the email headers, especially when someone asks to click on a
link. Spoofed emails made by talented attackers can be identical to the
genuine ones. They can seem indistinguishable even if you're a long-time
user.
DIFFERENT TECHNIQUES USED BY
SPAMMERS
• Domain Spoofing − The spammer sends an email on behalf of a known domain so
the receivers think that they know this person and open it.
• Poisoning Filters − A filter can be poisoned by adding text with the same color of
the background to reduce the scoring of the filters.
• Directory Harvesting − In directory harvesting, spammers generate email
addresses by using known email addresses from corporates or ISP (Internet
Service Provider).
• Social Engineering − Spammers send promotional emails to different users such
as offering huge discounts and tricking them to fill their personal data.
• Junk Tags − Spam Words can be hidden by including invalid HTML tags within
the words.
Thank you

You might also like