Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:58 PM
Dark Reading
Dark Reading
Products and Releases

Commtouch Report: Spam's Back And So Are Old Types Of Threats

During Q4, vintage spam methods were combined with new ones, according to CommTouch's Internet Threats Trend Report

Sunnyvale, Calif. – January 12, 2011 – Spam levels started bouncing back this week after a significant decrease in the fourth quarter, Commtouch' (Nasdaq: CTCH) reported today in its quarterly Internet Threats Trend Report, which covers spam, phishing, malware and Web threats.

December’s daily average for spam was around 30% less than in September; however spam activity increased by 45% just prior to the report’s publication. The average amount of spam for the fourth quarter of 2010 was 83% of all email sent worldwide, down from 88% in the third quarter. The number of zombies active in the fourth quarter was on average 15% less than in the previous quarter.

“An inactive botnet is like an idle factory, a money-losing proposition for spammers,” said Asaf Greiner, Commtouch vice president of products. “We have seen situations where after a lull in spam or malware distribution a new tactic was introduced. Threat experts are wise to continue following changes in network behavior in order to proactively block new threats.”

Highlights from the Q4 Trend Report include:

* Spam levels averaged 142 billion spam/phishing messages per day during Q4 compared to the 198 billion spam/phishing messages per day during Q3.

* Approximately 288,000 zombies were activated daily, a significant decrease as compared to 339,000 during Q3.

* The most popular spam topic in Q4 was pharmacy ads (42% of all spam).

* For the fifth quarter running, pornography/sexually explicit material is the website category most likely to include malware.

* India keeps its title for the third quarter in a row as the country with the most zombies – 17% of all zombies worldwide.

* Streaming media/downloads continues to be the most popular topic for blog creators in the Web 2.0 sphere of user-generated content.

During Q4, vintage spam methods were combined with new ones to further increase the potential for successful spam purchases, phishing, and malware installations. Small and hidden fonts were combined with Twitter subject lines and links exploiting Google’s cache service. This quarter also saw the return of ASCII art spam. As for more “modern” threats, Koobface malware links continued to circulate on Facebook, while box.net, offering content sharing and synchronization services, was used to host spam links.

Commtouch’s quarterly trend report reflects the results of its analysis of billions of Internet transactions daily within the company’s cloud-based GlobalView Network. With the acquisition of the Command Antivirus division of Authentium Commtouch has added the malware analysis capabilities of the Command AV labs.

Commtouch Recurrent Pattern Detection™, GlobalView technologies and multi-layered Command Antivirus identify and block Internet security threats. More details, including samples and statistics, are available in the Commtouch Q4 2010 Internet Threats Trend Report, available at: http://www.commtouch.com/download/1934.

NOTE: Reported global spam levels are based on Internet email traffic as measured from unfiltered data streams, not including internal corporate traffic. Therefore global spam levels will differ from the quantities reaching end user inboxes, due to several possible layers of filtering.

About Commtouch Commtouch' (NASDAQ: CTCH) provides proven Internet security technology to more than 150 security companies and service providers for integration into their solutions. Commtouch’s GlobalView™ and patented Recurrent Pattern Detection™ (RPD™) technologies are founded on a unique cloud-based approach, and work together in a comprehensive feedback loop to protect effectively in all languages and formats. Commtouch’s Command Antivirus utilizes a multi-layered approach to provide award winning malware detection and industry-leading performance. Commtouch technology automatically analyzes billions of Internet transactions in real-time in its global data centers to identify new threats as they are initiated, enabling our partners and customers to protect end-users from spam and malware, and enabling safe, compliant browsing. The company’s expertise in building efficient, massive-scale security services has resulted in mitigating Internet threats for thousands of organizations and hundreds of millions of users in 190 countries. Commtouch was founded in 1991, is headquartered in Netanya, Israel, and has a subsidiary with offices in Sunnyvale, California and Palm Beach Gardens, Florida.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.