Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/17/2009
04:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Report: Over 97% Of November Email Was Spam

Casino- and pharmaceutical-related spam remain at top, according to eleven

Berlin, 17 December 2009 " Spam constituted 97.1% of total e-mail traffic in October and November 2009. This is one of the findings of the eleven E-mail Security Report for October and November 2009, which was presented today by eleven, Germany's leading e-mail security specialist. Spam traffic continued to be dominated by casino and pharmaceutical-related spam. The main source of spam is Brazil, followed by Vietnam and India.

An overview of the most important trends:

Spam constituted 97.1% of total e-mail traffic in October and November " "clean" e-mails constituted 1.9%, e-mail viruses just under 0.1%.

Casino and pharmaceutical spam lead the "hit list" of spam content.

More than one sixth of all spam e-mails originated from IP addresses in Brazil, followed by Vietnam and India.

Backdoor Trojans, which constantly load new malware onto infected systems, constituted 75% of all viruses.

E-mails spreading the Trojans are usually disguised as important messages. The content ranged from e-cards, delivery notifications and software updates to requests for the reactivation of accounts.

The results of the eleven E-Mail Security Report October/November 2009 in detail

Proportion of spam

On average spam constituted 97.1% of total e-mail traffic in October and November 2009. "Clean" e-mails constituted just 1.9%, requested bulk e-mails (such as newsletters) 0.7%, and e-mails containing viruses just under 0.1%.

Spam campaigns

As in previous months, the main subject of spam was casino and pharmaceutical-related. The top positions go to two casino spam campaigns which made up 8.3% and 6.3% respectively. Third place goes to the "Canadian Pharmacy" spam campaign with 5.4%. Behind the "Canadian Pharmacy" campaign were Russian spammers who attempted to entice potential victims with subject titles such as "Spice up the bedroom!" The eleven experts have seen a rising trend in pharmaceutical-related spam with extravagant subject titles such as "Britney Spears is dead" to disguise the completely unrelated content of the

e-mail.

There is a clear difference in the way casino-related spam and pharmaceutical-related spam spread. While "Canadian Pharmacy" appeared consistently throughout this particular time frame, casino-related spam would let up for periods of up to 10 days, but was spread in larger waves. Overall there were on average over 3,000 different campaigns on any given day.

Event spam

The rising trend of spreading spam and malware with reference to current events also continued throughout October and November. Halloween in particular lead to large-scale spam campaigns. The Thanksgiving weekend including "Black Friday" and "Cyber Monday", two highly popular shopping days in the U.S., were

also targeted as opportunities for waves of spam. Christmas spam began early this year " the first waves were seen as soon as the middle of November.

Countries of origin

Brazil has established itself as the largest source of spam by far. 16.7% of all spam in November 2009 originated from IP addresses in Brazil. Second place went to Vietnam with 8.1%, third to India with 5.4%, followed by Russia (5.3%) and South Korea (4.6%). German IP addresses were responsible for 3.4% of all spam (eighth place) " a decrease from 4.9% in October (fifth place).

Viruses

Experts from eleven noted a trend in e-mail viruses of short (maximum 48 hours) but large-scale waves which were capable of causing a tenfold increase in the volume of viruses within a short period of time. The "virus hit parade" in October and November 2009 was headed by the Trojans DTR/Crypt.XPACK.Gen (32.2%) and DTR/Crypt.ZPACK.Gen (31.4%), making up two-thirds of the total volume of viruses. Both are variations of the Bredolab Trojan, which takes the form of a backdoor Trojan that is activated at every system start and constantly loads infected systems with new malware. In third place was DTR/Sasfis (12.58%), another backdoor Trojan which was spread through e-mails which, for example, falsely inform receivers that their mailboxes have been deactivated. The leading non-Trojan virus was again DWORM/NetSky.P, part of the NetSky family and well-known since 2006.

eleven E-Mail Security Report

Six times a year, the eleven E-Mail Security Report summarizes current spam and malware trends and numbers. The eleven Research Team analyzes the e-mails checked by the eleven Managed E-Mail Security Services, and interprets the results. eleven checks and categorizes over 1 billion e-mails every day. More than 30,000 businesses of all sizes use the eleven services.

eleven " e-mail security made in Germany

eleven is Germany's leading e-mail security provider. eXpurgate is the world's only spam filter and e-mail categorisation service that offers reliable protection against spam and phishing e-mails, recognises potentially dangerous e-mails and differentiates between individual e-mails and any kind of bulk e-mail. What's more, eXpurgate also offers a powerful e-mail firewall and a comprehensive range of options for protecting against viruses.

Alongside internet service providers such as T-Online, O2, Vodafone and freenet, eleven's client base includes many well-known companies and public institutions such as Air Berlin, the Association of German Banks, DATEV, the Free University of Berlin, Landesbank Berlin, Mazda, RTL, ThyssenKrupp and Tobit Software. Further information can be found at http://www.eleven.de.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.