Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Spam Reaching Record Volumes, Researchers Say

Study says 95% of all email is now spam

Just when you thought it couldn't get any worse, spam is growing again.

According to two separate reports issued this week, that hateful, useless email is increasing again, both in volume and as a percentage of the messaging payload, researchers say.

Ninety to 95 percent of all email sent in 2007 was spam, according to Barracuda Networks, which conducted an analysis of more than 1 billion daily email messages sent to its more than 50,000 customers worldwide. This figure has jumped from an estimated 85 percent to 90 percent of email in 2006 -- and leaped from figures collected in 2001, when spam accounted for only 5 percent of email messages.

Spam techniques also have become more sophisticated over the past several years, Barracuda said. The majority of spam emails in 2007 utilized identity obfuscation techniques, in which spammers send email from diverse sources throughout the Internet, thus hiding their own identity from traditional reputation checks that profile sender network addresses.

Many spammers also are hiding their identities by registering new domains or by redirecting spam Web domains through reputable blogs, free Website providers, or URL redirection services, Barracuda said.

Symantec's December spam report, which was released earlier this week, also reported record percentages of junk email, though its figures weren't quite as scary. The security company said that 72 percent of the email traffic it tracked in November was spam, up from 64 percent in May. The percentage is the highest that Symantec has ever recorded.

Image spam has been at the forefront of spam's resurgence in 2007, but the field has seen a number of "firsts" throughout the year, Symantec says. For example, the first partnerships between spammers and bot herders occurred during 2007, paving the way for a significant escalation in spam traffic.

With the surge, spam is also getting more attention among business managers, according to Barracuda. In a separate study of 261 business professionals, the anti-spam firm found that 57 percent of respondents felt that spam is the worst culprit among junk mail media, followed by postal junk mail (31 percent) and telemarketing (15 percent).

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Barracuda Networks Inc.
  • Symantec Corp. (Nasdaq: SYMC)

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 6/5/2020
    Abandoned Apps May Pose Security Risk to Mobile Devices
    Robert Lemos, Contributing Writer,  5/29/2020
    How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
    Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: What? IT said I needed virus protection!
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-13842
    PUBLISHED: 2020-06-05
    An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). A dangerous AT command was made available even though it is unused. The LG ID is LVE-SMP-200010 (June 2020).
    CVE-2020-13843
    PUBLISHED: 2020-06-05
    An issue was discovered on LG mobile devices with Android OS software before 2020-06-01. Local users can cause a denial of service because checking of the userdata partition is mishandled. The LG ID is LVE-SMP-200014 (June 2020).
    CVE-2020-13839
    PUBLISHED: 2020-06-05
    An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via a custom AT command handler buffer overflow. The LG ID is LVE-SMP-200007 (June 2020).
    CVE-2020-13840
    PUBLISHED: 2020-06-05
    An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via an MTK AT command handler buffer overflow. The LG ID is LVE-SMP-200008 (June 2020).
    CVE-2020-13841
    PUBLISHED: 2020-06-05
    An issue was discovered on LG mobile devices with Android OS 9 and 10 (MTK chipsets). An AT command handler allows attackers to bypass intended access restrictions. The LG ID is LVE-SMP-200009 (June 2020).