Endpoint
7/16/2013
05:21 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

U.S. Still Tops Spam-Relaying 'Dirty Dozen' Countries

Three new companies enter Sophos' top 12

BOSTON, MA – July 16, 2013 – Sophos has published the latest 'Dirty Dozen' of spam relaying countries, covering the second quarter of 2013. As the US retains the top spot among spam-relaying countries, Belarus makes a significant jump into second place. And three new countries enter the top twelve--Ukraine, Kazakhstan and Argentina, while three other countries exit the Dirty Dozen--France, Peru and South Korea.

Dirty Dozen Rating by Population

With more than a billion people and an increasing demand for internet access in both countries, it's no surprise to see China and India in the Dirty Dozen; and with more than 300 million people and the lion's share of the world's internet connectivity, it's also no shock that the US leads outright. So what happens when spam scores are scaled up or down in proportion to each country's population?

Half of the volume-based countries are gone, and others that would usually fly under the radar when measured on spamming volume alone, like Luxembourg and Singapore, suddenly burst onto the scene. This doesn't mean that Singapore is replete with spam-related cybercriminality.

Although the Dirty Dozen denotes the extent to which a country's computers are used for delivering spam, it doesn't identify where the spammers themselves are located. That's because most spam is sent indirectly these days, especially if it is overtly malevolent, such as:

· Phishing emails: These try to lure you into entering passwords into mock-ups of a real site such as your bank or your webmail account.

· Malware links: These urge you to click links that put you directly in harm's way by taking your browser to hacked websites.

· Malware deliveries: These use false pretences, such as fake invoices, to trick you into opening infected attachments.

· Identity theft: These invite you to reply with personally identifiable information, often by claiming to offer work from home opportunities.

· Investment scams: These talk up investment plans that are at best unregulated and at worst completely fraudulent.

· Advance fee fraud: These promise wealth or romance, but there are all sorts of fees, bribes and payments to hand over first.

"Remember that the Dirty Dozen doesn't tell us from where the spam originates," said Paul Ducklin, Sophos security evangelist. "It tells us how spam gets relayed from the crooks to their potential victims. Even if you're the most law-abiding citizen of the most law-abiding country in the world, you might be helping to project your own country into the Dirty Dozen if you don't take security seriously on your own computer. It may sound corny, but security really does begin at home."

There are a few simple precautions can help enormously, according to Ducklin. These include "timely security patching, an up-to-date anti-virus and a healthy skepticism about unwanted attachments and 'too good to be true' offers. By taking these steps, you'll not only protect yourself, but also help to protect everyone else at the same time."

Additional information about the latest dirty dozen report can be found on Sophos' Naked Security site at: http://nakedsecurity.sophos.com.

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.