Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/26/2007
01:46 AM
50%
50%

Marshal: Pump & Dump Spam Drops

Marshal announced pump 'n dump spam has dropped significantly

ATLANTA -- Email and Internet content security provider Marshal (www.marshal.com) today announced pump ‘n dump spam has dropped significantly. Stock spam now represents five percent of all spam compared to 50 percent in February. With North American headquarters in Atlanta, worldwide headquarters in the UK and several regional offices worldwide, Marshal reports breaking spam and security trends regularly.

“At the beginning of the year, pump ‘n dump spam was very popular, peaking at 50 percent of all spam in February,” said Bradley Anstis, director of product management, Marshal.

Over the past quarter, pump ‘n dump spam levels have fluctuated, but averaged around 30 percent. In just the last four weeks, the Marshal Threat Research and Content Engineering (TRACE) Team observed a rapid decline in the volume of stock spam to the lowest point it has seen in 10 months - 5.1 percent.

Pump ‘n dump spam is a form of financial fraud that involves artificially inflating the price of a stock through untrue or exaggerated promotion in order to sell stock at the inflated price. Once inflated, the spammers sell their stocks to make a profit which usually leads to the stock price crashing, leaving real investors with major losses.

Earlier this year, the US Securities and Exchange Commission (SEC) suspended trading of more than 30 companies targeted by pump ‘n dump spam, which can be partly attributed to this decline.

“Whether the decline in pump ‘n dump spam is due to the SEC’s recent action, overuse by spammers or increased use of advanced spam filtering solutions is moot. Evidently stock spam is significantly less effective in generating profits for spammers,” said Anstis.

Marshal Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1093
PUBLISHED: 2020-02-21
The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.
CVE-2012-0828
PUBLISHED: 2020-02-21
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BM...
CVE-2012-0844
PUBLISHED: 2020-02-21
Information-disclosure vulnerability in Netsurf through 2.8 due to a world-readable cookie jar.
CVE-2013-3587
PUBLISHED: 2020-02-21
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses...
CVE-2012-6277
PUBLISHED: 2020-02-21
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8....