Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:20 AM
Connect Directly

Over 10M Bots Active Worldwide in Q2

New report from Commtouch finds US bot count decreases, but Verizon is among the top 10 domains used for hosting zombies

Among the top 10 domains hosting the majority of bot-infected computers are some major ISPs -- Telecom Italia, Brasil Telecom, and Verizon, according to a new report on second-quarter email threats from Commtouch Software Ltd.

An average of 10 million bot machines were active each day during Q2. The geographic location of bots was fairly evenly distributed among several countries, with Turkey at the top (11 percent), followed by Brazil (8.4 percent), and Russia (7.4 percent) in Q2. The U.S. dropped from 5 percent of all zombies in Q1 to 4.3 percent in Q2, according to the report, which found Italy, India, Germany, Poland, and Colombia, respectively, ahead of the U.S. as well.

ISP IP’s are regularly sending out the most bot-borne spam, according to the report. Telecom Italia had around 1.2 million bots in Q2, just behind Turkey-based ttnet.net.tr, which had the most bots, 1.8 million. Brasil Telecom had a bot count of nearly 650,000, while Verizon was at about 556,000, according to the report.

Meanwhile, the amount of spam in overall email traffic worldwide ranged from 64 percent to 94 percent during the second quarter, which comes out to an average of 77 percent of all email. Another trend: pharmaceutical spam made up 46 percent of all spam, followed by sexual enhancement (22 percent) and replicas (21 percent). Porn was only about 3 percent of all spam, with loans/mortgage at 2 percent.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Commtouch Software Ltd.
  • Verizon Communications Inc. (NYSE: VZ) Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/13/2020
    Omdia Research Launches Page on Dark Reading
    Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
    Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
    Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-07-13
    The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
    PUBLISHED: 2020-07-13
    The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
    PUBLISHED: 2020-07-13
    An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
    PUBLISHED: 2020-07-13
    The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
    PUBLISHED: 2020-07-13
    A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.