backtop


Print 40 comment(s) - last by Cullinaire.. on Nov 20 at 1:20 AM


Day-to-day levels of image spam in September and October 2006
It's like the FBI's most wanted list for spam

Spamhaus, an international non-profit organization whose mission is to track the Internet's Spam Gangs, has released list of the top 10 spam offenders of the year.

 

Of all Internet Service Providers (ISP) in the world, Verizon Business is the number one offender on the list with almost triple the number of current known spam issues as its competitor SBC Communications.

 

Given that the most spammy ISPs are American, then it should come as no surprise that the United States leads all other countries with 1,983 current known spam issues. The next country in line is China with 304 known issues.

 

The worst spammers, however, are a different geographic picture, with the top (dis)honor going to Alex Blood of the Ukraine. Out of the top 10 spammers list, more than half were from Eastern Europe. The U.S. made the list twice at spots third and tenth.

 

Sophos, another company specializing in IT security, has published its own report on the top 12 spam relaying countries over the third quarter of 2006. Sophos’ results differ slightly from those of Spamhaus’, though the leading nations of the United States and China maintain their spots in both.

 

The United States relays 21.6 percent of the world’s spam, with China at 13.4 percent. The next two closest countries are France and South Korea, both at a comparatively lower 6.3 percent.

 

"Most unsolicited emails are now sent from zombie PCs - computers infected with Trojans, worms and viruses that turn them into spam-spewing bots. In the past hackers were very reliant on operating system vulnerabilities to convert an innocent computer into a zombie - now they are turning back to malware to trick users into running their malicious code, and opening the backdoor to hackers," said Carole Theriault, senior security consultant at Sophos. "Hundreds of new versions of the Stratio worm have helped steadily increase the volume of spam seen traveling across the net."

 

Embedding images is the latest tactic employed by spammers, and accounts for nearly 40% of all spam. Since many spam filters work by analyzing text, images have a greater chance of passing through undetected. Animated gifs also pose additional challenges for spam filters with its multiple layers of images.

 

Spammers are turning to new tricks in order to acquire email addresses. According to the Sophos report, the first asks recipients to forward their chain emails for a fake research project, while another campaign encourages users to visit a video tribute website, which then requests their email address in order to view the full video.

 

"Integrated anti-malware and anti-spam protection is getting the better of illegal spam peddlers - forcing them to get more creative and crooked. However, if people are playing their security cards right, the spammers' efforts will still be in vain," continued Theriault. "What's most surprising is that those behind these intrusive emails continue to take their chances, despite hefty fines and sentences being dealt out to guilty spammers around the world."



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

By crystal clear on 11/18/2006 2:05:29 AM , Rating: 2
Read this-


"'The company also found that spam surges are almost always tied to malware outbreaks. "A few weeks after a virus outbreak we see a big up tick in spam," he said.

The overall nature of spam has also changed, he said. Spam used to be the product of annoying but relatively harmless marketers. Now it's being produced by organised criminal operations.

"The economics are clearly in favor of the bad guys because it costs nothing to make a virus and spam run. But for businesses it's very costly," Druker said. "Spam isn't just clogging email servers. It's coming embedded with malicious links that can be used to infect the network. Phishing and other fraud is a huge factor -- spamming out URLS that could be used to steal your personal data or infect your machine."

Sophos Senior Technology Consultant Graham Cluley agreed with that assessment.

Source-

http://searchsecurity.techtarget.com.au/news/artic...




"Spreading the rumors, it's very easy because the people who write about Apple want that story, and you can claim its credible because you spoke to someone at Apple." -- Investment guru Jim Cramer











botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki