How CAPTCHA got trashed

The wiggly words are now most useful for malware authors

CAPTCHA used to be an easy and useful way for Web administrators to authenticate users. Now it's an easy and useful way for malware authors and spammers to do their dirty work.

CAPTCHA -- Completely Automated Public Turing Test to Tell Computers and Humans Apart -- was a good idea in its day. You presented users with an obfuscated string of characters and then had them decode and type the string in to get an e-mail account, a social networking account or comment access on an online forum. Not much fuss (though users justifiably complained that the difference between 1 (one) and l (the lower-case letter l) can be hard to see in many fonts) and certainly no muss from a Web administrator's point of view.

So it was that CAPTCHA went from relatively obscure security measure perfected in 2000 by researchers at Carnegie Mellon University to deployment by most of the major Web e-mail sites and many other Web sites by 2007. Sites such as Yahoo Mail, Google's Gmail and Microsoft's Hotmail all used -- and, for that matter, continue to use -- CAPTCHA to make sure that only human beings, not bots, could get accounts or make postings.

Those days are long gone.

By January 2008, Yahoo Mail's CAPTCHA had been cracked. Gmail was ripped open in April. Hotmail's top got popped during the same month.

And then things got bad.

There are now programs available online (no, we will not tell you where) that automate CAPTCHA attacks. You don't need to have any cracking skills. All you need is a desire to spread spam, make anonymous online attacks against your enemies, propagate malware or, in general, be an online jerk.

It's not just free e-mail sites that can be made to suffer, though.

John Nagle, founder of SiteTruth, a site that tries to identify bogus businesses and their Web sites, wrote in late May on Techdirt that while spam on the popular online classified ad service Craigslist "has been a minor nuisance for years ... this year, the spammers started winning and are taking over."

Craigslist tried "to stop spamming by checking for duplicate submissions," Nagle explained. "They check for excessive posts from a single IP address. They require users to register with a valid e-mail address. They added a CAPTCHA to stop automated posting tools. And users can flag postings they recognize as spam."

More about Carnegie Mellon University AustraliaGoogleMellonMessageLabsMicrosoftQuantumWebsenseYahoo


Darrell Shandrow


New Techniques Must Include Accessibility

Any "new techniques" that replace the traditional CAPTCHA must include alternatives that reasonably accommodate the needs of the blind and visually impaired. The proposed 3D solution is definitely not appropriate, as it further complicates the problem. We blind accessibility evangelists want protection against spam just like our sighted peers, but we will not accept ongoing, pervasive discrimination inherent in visual-only security schemes.



on the captcha variant used by qrbgs: a corrective

Quantum Random Bit Generators don't require calculus for their bot-fighter; but they might ask an easy question about the least zero of an (already factored) polynomial, for example, such as p(x) = (x+4)(x-6)(x+5)(x-4)(x-4) . Such a question doesn't ask for calculus, but asks for some high-school algebra. QRBG also say that they'll provide an easier question on request. Still, it's more than copying a nonsense blurb.



You certainly deserve a round of applause for your post and more specifically, your blog in general. Very high quality material

Rapidshare Search


I have many question about your post. I think u should write lot of more details. But Thanks anymore

who is lookup


due recently reinstalled the operating arrangement, and it took a batch of things in identical place

Comments are now closed

Symantec identifies sophisticated, stealthy 'Regin' malware