Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/23/2014
12:41 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Financial Data Leads The Malicious Spam Hit List For Third Year In A row

In some spam categories commercial advertising is being gradually displaced by criminal mailings

ABINGDON, England, January 23, 2014 /PRNewswire/ --

The proportion of spam in email traffic continues to fall - in the last three years the share of unsolicited messages has fallen by 10.7 percentage points. It appears that advertisers increasingly prefer the various types of legitimate online advertising that are now available and which generate higher response rates at lower costs than spam can offer.

The criminalisation of spam

In some spam categories commercial advertising is being gradually displaced by criminal mailings, such as spam messages, advertising illegal goods or pornography. A typical example is the Travel and Tourism category that used to account for 5-10% of all spam traffic. These days, commercial adverts like this are rare, but the experts see numerous malicious emails actively exploiting the subject of travel and leisure.

Fake antivirus vendor messages

It is common for IT security experts to recommend that users regularly update their antivirus solutions, and that is something that cybercriminals tried to take advantage of in 2013. In emails that appear to be sent by well-known antivirus vendors such as Kaspersky Lab, McAfee, ESET, Symantec etc., they urged users to update their systems immediately using an attached file. The attachment turned out to contain a Trojan from the infamous ZeuS/Zbot family that is designed to steal sensitive user data, particularly financial information.

Darya Gudkova, Head of Content Analysis at Kaspersky Lab, commented: "For the third year in a row the most prevalent malware spread by email were programs that attempted to steal confidential data, usually logins and passwords for Internet banking systems. At the same time, however, phishing attacks are shifting from bank accounts to social networking and email. This can be partly explained by the fact that today's email accounts often give access to a lot of content, including email, social networking, instant messaging, cloud storages and sometimes even a credit card."

'Gray' mailings: bypassing the spam filters

In a bid to reach even greater numbers of users, but wary of spam filters that block unwanted messages, advertisers are resorting to trickery. Part of a mass mailing is sent to subscribers who have agreed to receive adverts, and part is sent to addresses taken from huge databases these companies have purchased - to people who never gave their consent to receive such messages. If the mailings are blocked by spam filters, the advertisers contact the security vendor and try to prove their mailings are legitimate by showing the websites where users sign up and can unsubscribe at any time. This poses a new challenge for the anti-spam industry and is leading to the development of new technologies based on sender reputations.

Where's the spam coming from?

Asia accounted for 55.5% of the world's spam in 2013 (an increase of 5.3 percentage points compared to 2012), followed by North America with 19% (+ 3.2 points). Eastern Europe's share almost doubled compared to the previous year, placing the region in third with 13.3%. Western Europe remains in fourth place despite a decrease of 2.4 percentage points, while the share of Latin America in fifth place amounted to a threefold drop compared to 2012.

For more information about spam in 2013, please go to securelist.com

[http://www.securelist.com/en/analysis/204792322/Kaspersky_Security_Bulletin_Spam_evolution_2013

] .

Additional reading:

Spam in December 2013

[http://www.securelist.com/en/analysis/204792323/Spam_in_December_2013 ]

About Kaspersky Lab

Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions. The company is ranked among the world's top four vendors of security solutions for endpoint users*. Throughout its more than 16-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers.

Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at http://www.kaspersky.com.

* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2012. The rating was published in the IDC report "Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares (IDC #242618, August 2013). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2012.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Dueling Free Throws A riff on the song Dueling Banjos
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
CVE-2019-18853
PUBLISHED: 2019-11-11
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
CVE-2019-18854
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to unlimited recursion for a '<use ... xlink:href="#identifier">' substring.
CVE-2019-18855
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to potentially unwanted elements or attributes.
CVE-2019-18856
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.