Attacks/Breaches
8/12/2010
02:04 PM
Connect Directly
RSS
E-Mail
50%
50%

Symantec Finds 92% Of All E-Mail Is Spam

Report also says phishing is down despite the rise of a new Live-Chat based attack that tries to trick people into giving up personal details.

Spam is on the rise, and as of July 2010 comprises 92% of all e-mail messages, up from 89% just one year ago, according to a new Symantec study of spam and phishing trends.

Alarmingly, Symantec has also discovered a new type of attack that spoofs an e-commerce website's "live chat" feature that targets a person's login ID and password for the legitimate e-commerce site. "The phishing site involved bogus chat sessions to help the page look more authentic, trying to give customers the impression that the phishing website was interactive," said Symantec.

On the good news front, however, the amount of spam containing a phishing attack declined from June to July of this year by 5%.

Likewise, the number of different kinds of phishing attacks overall has been declining. In particular, the number of unique phishing websites -- created by automatic attack toolkits -- decreased by 60% from June to July, though the number of unique URLs used in phishing attacks increased by 10%.

In addition, non-English phishing sites -- especially in French and Italian -- have been continuing to grow, increasing by 15% from June to July of this year.

Spammers, ever topical, also continue to shift their tactics. A year ago, Barack Obama and Michael Jackson led the spam subject-line charts, while this past June the World Cup dominated. In July 2010, however, the most-seen spam subject line was "claim your part of the $20 billion BP oil fund."

Regional variations, however, are in full effect. Cruelly, Russian spammers are blanketing their country -- in the grip of a combined heat wave and wildfires of unknown magnitude -- with false advertisements for air conditioners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.