Home Malware

Below are the M3AAWG published materials related to our work on preventing and mitigating malware. There is also a Malware video playlist on our YouTube channel at www.youtube.com/maawg and there are a few selected videos on our website in the Training Videos and Keynotes Videos sections under the Meetings menu tab.

Best Practices

PDF
March 31, 2019

M3AAWG Email Anti-Abuse Product Evaluation Best Current Practices, Updated March 2019

Outlining practices used during trial evaluations of messaging anti-abuse products or services, this document provides recommendations on processes and techniques to accurately determine a particular solution’s effectiveness. The March 2019 version includes recommendations affected by newer technology, such as cloud services, and other updates.

PDF
December 20, 2018

M3AAWG Best Current Practices for Reporting Phishing URLs

Phishing continues to be a significant problem for hosting companies, mailbox providers, brand owners and, of course, for every internet user. This document iinforms all of these groups on the best current practices for reporting phishing URLs.

PDF
June 01, 2018

A M3AAWG Introduction to Addressing Malicious Domain Registrations

This document focuses on defining malicious domain names and provides a non-exhaustive list of possible actions that can be taken to address them.

PDF
May 01, 2018

M3AAWG Recommendations: Methods for Sharing Dynamic IP Address Space Information with Others-Updated May 2018 (2008)

Although M3AAWG recommends blocking outbound port 25 traffic as the best option for controlling the flow of unwanted email traffic from an ISP’s customer space, such blocks may not always be possible, either for the short or long term. This document offers some alternatives for these ISPs by describing methods they can use to share their dynamic space information with others and allow remote sites to reject inbound mail traffic from dynamic address space.

PDF
March 01, 2018

M3AAWG Compromised User ID Best Practices, Version 1.0.1

Updated in March 2018, this document addresses problems associated with compromised user accounts. It discusses mitigation techniques and methods of identifying compromised accounts, including recommendations to ensure the long-term security of accounts to prevent “re-compromise.”

Pages

Public Policy Comments

April 05, 2019

Comments Pertaining to the Domain Abuse Activity Reporting (DAAR) System

M3AAWG submitted comments to ICANN on April 5, 2019 asking that additional actionable information be included in the DAAR system.  The comments are listed on the ICANN correspondence website at https://www.icann.org/resources/pages/correspondence.

October 18, 2018

ICANN GDPR and WHOIS Users Survey

A joint survey conducted by the Anti-Phishing Working Group (APWG) and M3AAWG looks at how cyber investigators use WHOIS data and how the European Union’s General Data Protection Regulation (GDPR) has affected their anti-abuse efforts. The letter from M3AAWG and survey are also available on the ICANN site at https://www.icann.org/en/system/files/correspondence/upton-to-marby-et-a...

April 25, 2018

Temporary Access Method for Non-Public Whois Data, and accompanying accreditation policy points

Submitted jointly by the Anti-Phishing Working Group (APWG), M3aawg and First, this document describes a short-term method for authorized parties to access non-public WHOIS data via designated IP addresses.

April 13, 2018

WHOIS Tiered Access and Accreditation Program

M3AAWG submitted these short comments to ICANN stating that an expert group from the Anti-Abuse community should be created to facilitate the certification of qualified applicants from the security field.

Pages

M3AAWG Reports

M3AAWG Bot Metrics Report

September 01, 2014

Combines data from our first report in 2012 through 2013

M3AAWG Email Metrics Report

September 01, 2014

Combines data from our first report in 2012 through 2013

DM3Z Blog

Updates and Commentary from the Messaging, Malware and Mobile Anti-Abuse Working Group

M3AAWG has issued its first report examining the level of bot infections on consumer networks and the percentage of subscribers notified.  This is significant in that it is the first cooperative effort by network service providers to quantify the extent of malicious bots infecting their subscribers.  The M3AAWG Bot Metrics Report also provides data on the implementation of a portion of the Anti-Bot Code of Conduct for ISPs developed at the FCC’s Communications Security Reliability and Interoperability Council (CSRIC) under the leadership of M3AAWG Chairman Emeritus Michael O’Reirdan.

News

Subscribe to Subscribe to News Releases