Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/17/2009
04:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Report: Over 97% Of November Email Was Spam

Casino- and pharmaceutical-related spam remain at top, according to eleven

Berlin, 17 December 2009 " Spam constituted 97.1% of total e-mail traffic in October and November 2009. This is one of the findings of the eleven E-mail Security Report for October and November 2009, which was presented today by eleven, Germany's leading e-mail security specialist. Spam traffic continued to be dominated by casino and pharmaceutical-related spam. The main source of spam is Brazil, followed by Vietnam and India.

An overview of the most important trends:

Spam constituted 97.1% of total e-mail traffic in October and November " "clean" e-mails constituted 1.9%, e-mail viruses just under 0.1%.

Casino and pharmaceutical spam lead the "hit list" of spam content.

More than one sixth of all spam e-mails originated from IP addresses in Brazil, followed by Vietnam and India.

Backdoor Trojans, which constantly load new malware onto infected systems, constituted 75% of all viruses.

E-mails spreading the Trojans are usually disguised as important messages. The content ranged from e-cards, delivery notifications and software updates to requests for the reactivation of accounts.

The results of the eleven E-Mail Security Report October/November 2009 in detail

Proportion of spam

On average spam constituted 97.1% of total e-mail traffic in October and November 2009. "Clean" e-mails constituted just 1.9%, requested bulk e-mails (such as newsletters) 0.7%, and e-mails containing viruses just under 0.1%.

Spam campaigns

As in previous months, the main subject of spam was casino and pharmaceutical-related. The top positions go to two casino spam campaigns which made up 8.3% and 6.3% respectively. Third place goes to the "Canadian Pharmacy" spam campaign with 5.4%. Behind the "Canadian Pharmacy" campaign were Russian spammers who attempted to entice potential victims with subject titles such as "Spice up the bedroom!" The eleven experts have seen a rising trend in pharmaceutical-related spam with extravagant subject titles such as "Britney Spears is dead" to disguise the completely unrelated content of the

e-mail.

There is a clear difference in the way casino-related spam and pharmaceutical-related spam spread. While "Canadian Pharmacy" appeared consistently throughout this particular time frame, casino-related spam would let up for periods of up to 10 days, but was spread in larger waves. Overall there were on average over 3,000 different campaigns on any given day.

Event spam

The rising trend of spreading spam and malware with reference to current events also continued throughout October and November. Halloween in particular lead to large-scale spam campaigns. The Thanksgiving weekend including "Black Friday" and "Cyber Monday", two highly popular shopping days in the U.S., were

also targeted as opportunities for waves of spam. Christmas spam began early this year " the first waves were seen as soon as the middle of November.

Countries of origin

Brazil has established itself as the largest source of spam by far. 16.7% of all spam in November 2009 originated from IP addresses in Brazil. Second place went to Vietnam with 8.1%, third to India with 5.4%, followed by Russia (5.3%) and South Korea (4.6%). German IP addresses were responsible for 3.4% of all spam (eighth place) " a decrease from 4.9% in October (fifth place).

Viruses

Experts from eleven noted a trend in e-mail viruses of short (maximum 48 hours) but large-scale waves which were capable of causing a tenfold increase in the volume of viruses within a short period of time. The "virus hit parade" in October and November 2009 was headed by the Trojans DTR/Crypt.XPACK.Gen (32.2%) and DTR/Crypt.ZPACK.Gen (31.4%), making up two-thirds of the total volume of viruses. Both are variations of the Bredolab Trojan, which takes the form of a backdoor Trojan that is activated at every system start and constantly loads infected systems with new malware. In third place was DTR/Sasfis (12.58%), another backdoor Trojan which was spread through e-mails which, for example, falsely inform receivers that their mailboxes have been deactivated. The leading non-Trojan virus was again DWORM/NetSky.P, part of the NetSky family and well-known since 2006.

eleven E-Mail Security Report

Six times a year, the eleven E-Mail Security Report summarizes current spam and malware trends and numbers. The eleven Research Team analyzes the e-mails checked by the eleven Managed E-Mail Security Services, and interprets the results. eleven checks and categorizes over 1 billion e-mails every day. More than 30,000 businesses of all sizes use the eleven services.

eleven " e-mail security made in Germany

eleven is Germany's leading e-mail security provider. eXpurgate is the world's only spam filter and e-mail categorisation service that offers reliable protection against spam and phishing e-mails, recognises potentially dangerous e-mails and differentiates between individual e-mails and any kind of bulk e-mail. What's more, eXpurgate also offers a powerful e-mail firewall and a comprehensive range of options for protecting against viruses.

Alongside internet service providers such as T-Online, O2, Vodafone and freenet, eleven's client base includes many well-known companies and public institutions such as Air Berlin, the Association of German Banks, DATEV, the Free University of Berlin, Landesbank Berlin, Mazda, RTL, ThyssenKrupp and Tobit Software. Further information can be found at http://www.eleven.de.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.