{"id":51056,"date":"2024-04-23T08:38:17","date_gmt":"2024-04-23T12:38:17","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=51056"},"modified":"2024-04-24T07:58:11","modified_gmt":"2024-04-24T11:58:11","slug":"ksmg-content-filtering","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ksmg-content-filtering\/51056\/","title":{"rendered":"How to fine-tune email protection"},"content":{"rendered":"<p>When it comes to spam, we usually think of a bunch of absolutely irrelevant advertising letters, which antispam engines filter out with no trouble at all. However, this is far from the most unpleasant thing that can fall into your mailbox. Sometimes spam is used to carry out a DDoS attack on corporate email addresses, and the victim gets bombarded with completely legitimate emails that don\u2019t raise any suspicion of a standard antispam engine.<\/p>\n<h2>Registration confirmations attack<\/h2>\n<p>In order to perform a mail bomb attack, attackers can exploit the registration mechanisms on the web resources of totally unrelated companies. Using automation tools, they register on thousands of services from different countries using the victim\u2019s email address. As a result, a huge number of confirmations, links to activate your account, and similar letters end up in your mailbox. Moreover, since they\u2019re sent by legitimate mail servers with a good reputation, the antispam engine considers them legal and doesn\u2019t block them.<\/p>\n<div id=\"attachment_51057\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/23082502\/ksmg-content-filtering-letters.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-51057\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/23082502\/ksmg-content-filtering-letters.jpg\" alt=\"Examples of registration confirmation emails\" width=\"1460\" height=\"960\" class=\"size-full wp-image-51057\"><\/a><p id=\"caption-attachment-51057\" class=\"wp-caption-text\">Examples of registration confirmation emails used for DDoS attacks on corporate email addresses<\/p><\/div>\n<p>As a target the attackers usually choose an address that\u2019s crucial for the company\u2019s work \u2014 something that\u2019s used to communicate with clients or partners; for example, a mailbox of the sales department, technical support, or a bank\u2019s address to which applications for mortgage loans are sent. An attack can last for days, and the plethora of emails \u00a0simply overload the victim\u2019s mail server and paralyze the work of the attacked department.<\/p>\n<p>To successfully protect a mailbox from such an attack, a more sophisticated tool is required. As one of the approaches to protection against mail bombs, we propose using the personalized content filtering module built into our updated <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-security-appliance?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Secure Mail Gateway<\/a> In particular, in the above example of an attack through registration mechanisms, the operator can block letters based on the presence of the word \u201cregistration\u201d in various languages in the Subject field (Registrace | Registracija | Registration | Registrierung | Regisztr\u00e1ci\u00f3). As a result, emails will be automatically sent to quarantine without reaching the inbox and overloading the mail server.<\/p>\n<h2>Personalized mail filter settings<\/h2>\n<p>In Kaspersky Secure Mail Gateway version 2.1 we\u2019ve added the following options for filtering incoming and outgoing mail:<\/p>\n<ul>\n<li>by letter size;<\/li>\n<li>by attachment types and names;<\/li>\n<li>by sender \u2014 you can specify a specific sender address or a regular expression;<\/li>\n<li>by recipients (including hidden ones);<\/li>\n<li>by the presence of certain text in the body of the letter (keywords and regular expressions can be added to the dictionary);<\/li>\n<li>by the presence of text in the subject of the letter \u2013 by keywords, using masks and regular expressions, indicating specific senders;<\/li>\n<li>by X-headers.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2>Flexible filtering of business mailings<\/h2>\n<p>The new capabilities of our solution can be used not only to protect against email bombs attacks. They can be used, for example, for flexible configuration of B2B-mailout filtering. Not all employees perceive all kinds of business mailings in the same way: for some it makes sense to delve into offers to purchase electronic components; for others such advertisements just clog up their inboxes, while they consider various invitations to participate in conferences or conduct seminars extremely valuable.<\/p>\n<p>Therefore, completely blocking legitimate business mailouts isn\u2019t an option. But on the other hand, it\u2019s also not worth allowing their uncontrolled delivery: someone will always be dissatisfied. Therefore, Kaspersky Secure Mail Gateway doesn\u2019t categorize such letters as spam, but allows you to configure their flexible filtering by senders, recipients, text in the subject or body of the letter, and so on.<\/p>\n<p>You can learn more about Kaspersky Secure Mail Gateway, part of Kaspersky Security for Mail Servers solution on <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">our corporate website<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"32361\">\n","protected":false},"excerpt":{"rendered":"<p>How to protect your company from mail bombs and other unwanted correspondence using personalized content filtering<\/p>\n","protected":false},"author":2759,"featured_media":51058,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[240],"class_list":{"0":"post-51056","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-spam"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ksmg-content-filtering\/51056\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ksmg-content-filtering\/27350\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ksmg-content-filtering\/22678\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ksmg-content-filtering\/30027\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ksmg-content-filtering\/27505\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ksmg-content-filtering\/37334\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ksmg-content-filtering\/27677\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ksmg-content-filtering\/33510\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ksmg-content-filtering\/33170\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/spam\/","name":"spam"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2759"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=51056"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51056\/revisions"}],"predecessor-version":[{"id":51061,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51056\/revisions\/51061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/51058"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=51056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=51056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=51056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}