Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Symantec Finds 92% Of All E-Mail Is Spam

Report also says phishing is down despite the rise of a new Live-Chat based attack that tries to trick people into giving up personal details.

Spam is on the rise, and as of July 2010 comprises 92% of all e-mail messages, up from 89% just one year ago, according to a new Symantec study of spam and phishing trends.

Alarmingly, Symantec has also discovered a new type of attack that spoofs an e-commerce website's "live chat" feature that targets a person's login ID and password for the legitimate e-commerce site. "The phishing site involved bogus chat sessions to help the page look more authentic, trying to give customers the impression that the phishing website was interactive," said Symantec.

On the good news front, however, the amount of spam containing a phishing attack declined from June to July of this year by 5%.

Likewise, the number of different kinds of phishing attacks overall has been declining. In particular, the number of unique phishing websites -- created by automatic attack toolkits -- decreased by 60% from June to July, though the number of unique URLs used in phishing attacks increased by 10%.

In addition, non-English phishing sites -- especially in French and Italian -- have been continuing to grow, increasing by 15% from June to July of this year.

Spammers, ever topical, also continue to shift their tactics. A year ago, Barack Obama and Michael Jackson led the spam subject-line charts, while this past June the World Cup dominated. In July 2010, however, the most-seen spam subject line was "claim your part of the $20 billion BP oil fund."

Regional variations, however, are in full effect. Cruelly, Russian spammers are blanketing their country -- in the grip of a combined heat wave and wildfires of unknown magnitude -- with false advertisements for air conditioners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.
CVE-2012-1592
PUBLISHED: 2019-12-05
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
CVE-2019-16770
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
CVE-2019-19609
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.