Risk

7/14/2010
11:30 AM
50%
50%

US Extends Spam Lead

Twice as much spam comes from the United States as any other country in the world, finds Sophos.

Received a spam e-mail lately? No matter where you are in the world, statistically speaking, a report finds that it's most likely to have come from the United States.

Indeed, according to security firm Sophos, which released the study, in the second quarter of 2010, 15.2% of all global spam messages emanated from the United States, an increase from the 13.1% seen in the first quarter of 2010. Rounding out the top five list of global spam-generating countries were India (7.7%), Brazil (5.5%), the United Kingdom (4.6%), and South Korea (4.2%).

In addition, the study found that 97% of all e-mails received by business e-mail servers are now spam.

On a more regional level, from the first to second quarter of 2010, Europe overtook Asia for the sheer volume of spam being generated, reported Sophos. Today, 35% of all spam arrives via European PCs, followed by computers in Asia (30.9%), North America (18.9%), South America (11.5%), and Africa (2.5%).

The problem with spam, beyond the annoyance factor, is twofold. First, "spam is becoming increasingly malicious -- not just advertising unwanted goods, but spreading links to malicious websites and computer-infecting malware," according to a statement released by Sophos.

Second, the lion's share of spam emanates from compromised -- aka zombie -- PCs controlled by massive, distributed botnets such as Zeus, which can be created and managed using automated botnet toolkits, which lowers the barrier to entry for criminals without advanced coding skills.

"These cybercriminals are motivated by money --- and they don't just use your hacked PC to spread spam, but also to steal your identity and bank account information, to launch denial-of-service attacks, and to distribute malware to recruit even more innocent computers into their army," said Graham Cluley, senior technology consultant, in a Sophos blog post.

Will spam ever die? Given the financial incentives, don't bet on it, said Cluley. "Spam will continue to be a global problem for as long as it makes money for the spammers. It makes commercial sense for the criminals to continue if even a tiny proportion of recipients clicks on the links."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11471
PUBLISHED: 2018-05-25
Cockpit 0.5.5 has XSS via a collection, form, or region.
CVE-2018-11472
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has Reflected XSS during Login (i.e., the login parameter to admin/index.php).
CVE-2018-11473
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).
CVE-2018-11474
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Administrations Tab. A password change at admin/index.php?id=users&action=edit&user_id=1 does not invalidate a session that is open in a different browser.
CVE-2018-11475
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Users tab. A password change at users/1/edit does not invalidate a session that is open in a different browser.