Related Links

  • Cloudmark
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Related Stories

  • Facebook app pages serving up Javascript and acai berry spam
    It's taken a while for hackers to figure out how, but it seems that Facebook's on-system apps have finally been subverted to generate spam within the social networking platform. The move also signals the potential for outbound spam from Facebook on to the internet.
  • Cybercriminals developing mobile internet pharma spam landing sites
    Research carried out by a US IT security research firm claims to show that cybercriminals are starting to adapt to the constantly changing threat landscape. As a result, the firm says that rogue pharmacy sites – used as landing pages for so-called pharma spam – are being adapted for mobile internet users.
  • SpamIt and Glavmed pharmacy spam campaigns generate $50m a year
    Reports are coming in that a cybercriminal gang - with members who were involved in the Storm and Waledac worms - have raked in more than $150 million promoting unlicensed online pharmacies between May 2007 and June 2010.
  • Royal Wedding attended by spammers
    Two month's away, the wedding of Prince William and Kate Middleton is already being used by spammers to lure internet users to click through and buy replica goods.
  • Russian police squash major pharmacy spam campaign
    It seems that Russian police are working steadily to crush the rising tide of so-called pharma spam campaigns, with one security researcher having heard about a raid on the hackers behind the Rx-Promotions scheme.

Top 5 Stories


Cloudmark says IPv6 may cause rise in spam volumes

14 March 2011

With a number of ISPs and vendors preparing for World IPv6 day, a leading anti-spam systems and software firm says that the advent of IPv6 may cause a rise in the volume of spam reaching everyone's mailboxes.

According to Stuart Paton, senior solutions architect with Cloudmark, the internet is moving swiftly to adopt a new technology for the underlying networking used to track nodes on the network and communicate.

Because of this, he argues that the introduction of the IPv6 scheme could have a far reaching impact on spam security.

"As an example, the primary method for stopping the majority of spam used by email providers is to track bad IP addresses sending email and block them - a process known as IP Blacklisting", he said.

"With IPv6 this technique will no longer be possible and could mean that email systems would quickly become overloaded if new approaches are not developed to address this. This is one example, but there are other examples across the web", he added.

Paton went on to say that IPv6 has been designed to have a significantly larger number of available IP addresses than IPv4.

"Fundamentally, this presents serious difficulties in tracking all of the IPs for any purpose-email sender reputation, denial of service, sources used for malicious sign ups to websites, sources of click fraud attacks, influencing of search engine results, and many other scenarios", he explained.

Paton cites the example of the IPv6 address space being so large that it would be easy for spammers to use a single IP address just once to send a single email.

Based on these new risks with IPv6, he says that Cloudmark advocates that ISPs do not initially need to be able to receive mail from IPv6 addresses except from their own customers.

This would, he adds, ensure business continuity for ISPs and provisioning of ADSL/Cable modems to continue.

"This measure will also protect the IPv4 reputation system that is currently in use and working well", he noted.

This article is featured in:
Internet and Network Security  •  Malware and Hardware Security



ahpeterson says:

14 March 2011
While IPv6 certainly adds a great deal of address space, suggesting IP reputation will be impossible with it is absolutely not true. For more information, see here:

Note: The majority of comments posted are created by members of the public. The views expressed are theirs and unless specifically stated are not those Elsevier Ltd. We are not responsible for any content posted by members of the public or content of any third party sites that are accessible through this site. Any links to third party websites from this website do not amount to any endorsement of that site by the Elsevier Ltd and any use of that site by you is at your own risk. For further information, please refer to our Terms & Conditions.

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×