
In security and spamblocking circles, you often hear vendors and theirresearchers talk about mysterious and very confidential spamtrap data. Inthis article, I will provide a brief introduction to what a spamtrap reallyis, how a spamtrap is created or maintained, and how spamtrap data can be used.
A spamtrap is very simple. It is an email address or domain that exists solelyto receive spam. The address generally has never been assigned to an actualuser, or the address has bounced mail or been unreachable for a significantperiod of time before being put into use as a trap. The address exists for noreason except to receive spam.
One can find or create spamtrap addresses in a variety of ways:
MX
In general, it is a poor practice to use role accounts (“postmaster@”,“abuse@”, “hostmaster@”, and variations thereof) as spamtraps. Those addressesand other role accounts are required to be deliverable by RFC and may containreal, one-to-one mail. Running a spamtrap does not preclude being a goodInternet citizen.
It may take time for a seeded spamtrap to bear fruit. Do not be discouraged ifit takes several months for a seed to start receiving spam, or to receive morethan a trickle. Addresses are harvested via a variety of bad actors andmethods, and it takes time for harvested addresses to propagate.
A spamtrap address will eventually dry up. To ensure a steady supply of spam,many trap operators create and seed addresses on a regular schedule. Agood operator also looks for ham intheir spamtrap, as well. If a spamtrap receives real mail, it should be takenout of service immediately. The stealthiest way to do so is to simply receivethe mail as usual and then send it to
/dev/null
. Rejecting mail outright cantip your hand; spamtraps work best when their operation is opaque tooutsiders.
Once a spamtrap address is receiving spam consistently there is thequestion of what to do with that spam. One of the core values here at Farsightis that data should never go to waste, and spamtraps are an excellentillustration of that point. Some potential uses of spamtraps include:
The only restrictions are your own creativity and available resources.
As I’ve shown, setting up a spamtrap is a fairly straightforward process andthe value to an organization can be immense.
As a spamtrap’s volume grows, so does its complexity. In the next post, I willdiscuss how to keep your spamtrap from looking like a spamtrap and theimportance of keeping spamtrap data in the right hands.
Kelly Molloy is a Senior Program Manager for Farsight Security, Inc.
Read the next part in this series: Spamtraps: Keeping it Confidential