Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/9/2009
04:19 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Reports: Spammers Cooking Up More Financial Fraud

Financial spam scams tripled so far this year over last, spammers to target 'tiny URLs'

It didn't take long for spammers to jump on the financial crisis bus: A little more than one week into the New Year, financial spam has tripled over the same time last year, according to new spam data released today.

And in the wake of the recent Twitter phishing hack, look for the bad guys this year to start exploiting those convenient and cute "tiny URLs" (tinyurl.com).

These are among the big trends in spamming highlighted by Symantec, MXLogic, and MessageLabs (now part of Symantec) in their latest spam trend reports and forecasts. McAfee, which will release its spam report next week, also points to financially related spam, such as do-it-yourself home businesses aimed at the unemployed, and expects targeted phishing and corporate blackmail to jump this year as well.

MessageLabs says financial scam spams so far have tripled this month over the same period last January. This type of spam -- such as "Congratulations New Year winner! You have won the UK National Lottery" -- currently makes up around 10 percent of all email, according to MessageLabs, versus 3.1 percent during the same period in 2008, and 4.2 percent in December 2008.

"The new year means new opportunities for spammers," says Paul Wood, senior analyst with MessageLabs. "As the economic climate continues to be frosty and the inability to secure credit through official channels remains, spammers are tempted by the possibility that consumers facing uncertain futures may be more tempted by some of these hard-to-resist offers."

The overall percentage of spam was down slightly in December '08, according to MXLogic -- to 85.1 percent of all global email in December versus 86.3 percent in November.

Symantec reports that aside from financial spam, the other major types were spam relating to the Internet (24 percent), leisure-related spam (18 percent), product spam (18 percent), and health-related spam (11 percent).

And according to Symantec, the U.S. is the No. 1 region sending spam, with 27 percent, followed by China and Brazil, each with 7 percent, and South Korea and Russia, each with 4 percent. MXLogic also found the U.S. as the No. 1 spammer, followed by Brazil, the Russian Federation, Poland, and Ukraine.

According to MessageLabs, the takedown of rogue hosting provider McColo in November resulted in a 65 percent decrease in global spam, and spam volume has yet to fully recover to its previous levels. Its parent company, Symantec, meanwhile, says spam is at about 80 percent of its volume prior to McColo's shutdown, while McAfee says spam levels are 40 percent less than they were prior to McColo's demise.

MXLogic speculates that botnet herders trying to boost their bot populations in the wake of the McColo takedown were behind the worms seen last month in spammed fake e-cards and promotional messages using brands like Coca-Cola and McDonald's.

Another big trend is spammers trying to piggyback on legitimate email newsletters, according to Symantec. This is where spammers insert spam images into templates of legit newsletters and ads. That ensures the spam gets past filters, for instance.

"Just like news on the economy, the new year brings little good news when referring to the spam landscape. In addition to spam levels creeping back up, spammers continue to hide behind the reputation of legitimate senders and social networking sites," says Dermot Harnett, principal analyst for antispam engineering at Symantec.

Says Jeff Green, senior vice president, McAfee Avert Labs: "With more people out of work or self-employed going into 2009, beware of communication offering low-cost degrees and do-it-yourself kits, as well as any requests for financial information from what looks like your bank, school, or investment firm."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Data Loss Spikes Under COVID-19 Lockdowns
Seth Rosenblatt, Contributing Writer,  5/28/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13817
PUBLISHED: 2020-06-04
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attac...
CVE-2020-13818
PUBLISHED: 2020-06-04
In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.
CVE-2020-6640
PUBLISHED: 2020-06-04
An improper neutralization of input vulnerability in the Admin Profile of FortiAnalyzer may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the Description Area.
CVE-2020-9292
PUBLISHED: 2020-06-04
An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges via the AoWinAgt executable service path.
CVE-2019-16150
PUBLISHED: 2020-06-04
Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded ...