Vulnerabilities / Threats
1/23/2014
12:41 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Financial Data Leads The Malicious Spam Hit List For Third Year In A row

In some spam categories commercial advertising is being gradually displaced by criminal mailings

ABINGDON, England, January 23, 2014 /PRNewswire/ --

The proportion of spam in email traffic continues to fall - in the last three years the share of unsolicited messages has fallen by 10.7 percentage points. It appears that advertisers increasingly prefer the various types of legitimate online advertising that are now available and which generate higher response rates at lower costs than spam can offer.

The criminalisation of spam

In some spam categories commercial advertising is being gradually displaced by criminal mailings, such as spam messages, advertising illegal goods or pornography. A typical example is the Travel and Tourism category that used to account for 5-10% of all spam traffic. These days, commercial adverts like this are rare, but the experts see numerous malicious emails actively exploiting the subject of travel and leisure.

Fake antivirus vendor messages

It is common for IT security experts to recommend that users regularly update their antivirus solutions, and that is something that cybercriminals tried to take advantage of in 2013. In emails that appear to be sent by well-known antivirus vendors such as Kaspersky Lab, McAfee, ESET, Symantec etc., they urged users to update their systems immediately using an attached file. The attachment turned out to contain a Trojan from the infamous ZeuS/Zbot family that is designed to steal sensitive user data, particularly financial information.

Darya Gudkova, Head of Content Analysis at Kaspersky Lab, commented: "For the third year in a row the most prevalent malware spread by email were programs that attempted to steal confidential data, usually logins and passwords for Internet banking systems. At the same time, however, phishing attacks are shifting from bank accounts to social networking and email. This can be partly explained by the fact that today's email accounts often give access to a lot of content, including email, social networking, instant messaging, cloud storages and sometimes even a credit card."

'Gray' mailings: bypassing the spam filters

In a bid to reach even greater numbers of users, but wary of spam filters that block unwanted messages, advertisers are resorting to trickery. Part of a mass mailing is sent to subscribers who have agreed to receive adverts, and part is sent to addresses taken from huge databases these companies have purchased - to people who never gave their consent to receive such messages. If the mailings are blocked by spam filters, the advertisers contact the security vendor and try to prove their mailings are legitimate by showing the websites where users sign up and can unsubscribe at any time. This poses a new challenge for the anti-spam industry and is leading to the development of new technologies based on sender reputations.

Where's the spam coming from?

Asia accounted for 55.5% of the world's spam in 2013 (an increase of 5.3 percentage points compared to 2012), followed by North America with 19% (+ 3.2 points). Eastern Europe's share almost doubled compared to the previous year, placing the region in third with 13.3%. Western Europe remains in fourth place despite a decrease of 2.4 percentage points, while the share of Latin America in fifth place amounted to a threefold drop compared to 2012.

For more information about spam in 2013, please go to securelist.com

[http://www.securelist.com/en/analysis/204792322/Kaspersky_Security_Bulletin_Spam_evolution_2013

] .

Additional reading:

Spam in December 2013

[http://www.securelist.com/en/analysis/204792323/Spam_in_December_2013 ]

About Kaspersky Lab

Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions. The company is ranked among the world's top four vendors of security solutions for endpoint users*. Throughout its more than 16-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers.

Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at http://www.kaspersky.com.

* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2012. The rating was published in the IDC report "Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares (IDC #242618, August 2013). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2012.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.