Q1 Threat Report: Surge in Malware, Drop in Spam - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Q1 Threat Report: Surge in Malware, Drop in Spam-4 Next

The takedown of the Rustock botnet resulted in the shutoff of major zombies and command structures that caused spam volumes to fall all over the world. Spam, which has been at its lowest levels since 2007 in the past few quarters, significantly dropped once again to less than half of what it was only a year ago — at approximately 1.5 trillion messages per day, outnumbering legitimate email traffic by only a 3:1 ratio.

Although Zeus botnet development has declined, the author has apparently shifted efforts to merging the Zeus source code with the SpyEye botnet, resulting in large-scale threats affecting banking and online transactions. As of March 2011, the most recent SpyEye botnet can thrive on more than 150 modules, such as USB thumb drives, instant messaging and Firefox certificates.

McAfee recently released the “McAfee Threats Report: First Quarter 2011.” With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history. The report revealed many of the trends that had a significant impact on the threat landscape, such as the takedown of the Rustock botnet, which resulted in spam remaining at its lowest levels since 2007, and confirmed that mobile malware is the new frontier of cybercrime.

“The Q1 Threats Report indicates that it’s been a busy start to 2011 for cybercriminals,” said Vincent Weafer, senior vice president of McAfee Labs. “Even though this past quarter once again showed that spam has slowed, it doesn’t mean that cybercriminals aren’t actively pursuing alternate avenues. We’re seeing a lot of emerging threats, such as Android malware and new botnets attempting to take over where Rustock left off, that will have a significant impact on the activity we see quarter after quarter.”

More Slideshows:

Social Networking Rules of the Road, Including Facebook Tips to help you navigate the social networking landscape.

Ten Tips for Getting the Most Out of Your Laptop Quick tips and configurations to help you optimize your laptop experience.

Ten Security Tips for iPhones and iPads Recommendations from the NSA for maintaining iOS 4 security.


Related Topics : Transport Layer Security, Encryption, SEO, Switches

More Slideshows

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security118-190x128 5 Essential Incident Response Checklists

When a security breach occurs, IT teams that are armed with incident response checklists will be better prepared to execute a fast and effective response. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.