Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/27/2009
02:24 PM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Spam Surge: 9 Out Of 10 E-mails Can't Be Good!

90% of all email was spam last month, according to Symantec's MessageLabs Intelligence Report, just released. The figure is up more than 5% in the last month. Good news, I guess, is that things can't get much more than 10% worse from here.

90% of all email was spam last month, according to Symantec's MessageLabs Intelligence Report, just released. The figure is up more than 5% in the last month. Good news, I guess, is that things can't get much more than 10% worse from here.The new MessageLabs Intelligence Report quantifies a number of trends, measured in April traffic, that give some insight into how the spammers are coming at us:

Spam runs on U.S. time: Spam levels peak in the U.S. between 9am and 10am, local. MessageLabs' conclusion is that either the most active spammers are based in the U.S., or that that first full hour of the workday is when recipients are likeliest to respond. My guess -- and it is a guess -- is that it's the latter; people settling in to work may be easier marks while the first cup of coffee is still warm than later in the day when they're preoccupied with other (one hopes more work-related) demands.

CAPTCHA can't catch 'em: The number of effective CAPTCHA-cracking tools is letting the spammers get around the random letter/number tests designed to keep spammers from getting around them; hence, the sharp increase in the number of phony social network and webmail accounts the spammers are creating. The report suggests that new, tougher CAPTCHA-esque technology on the horizon is driving spammers to CAPTCHA while the CAPTCHA-ing is good. Botnets are the base: Close to 60% of spam was botnet-generated, with the three most active bots accounting for more than a third of spam.

Social nets net spam: No news here that social networks, and free mail services are prime targets for address harvesting and malicious link distribution.

As I said at the outset, the spam situation, statistically, can't get much worse.

Bur of course it doesn't have to.

The complete MessagLabs Intelligence Report for May, 2009 can be downloaded here.

Looking to keep security high and security expenditures low? Check out bMighty bSecure SMB Security On A Budget, now available on-demand.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...