June 2011 Spam and Phishing Report - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next June 2011 Spam and Phishing Report-7 Next

  • As the global spam level declined in June 2011, Saudi Arabia became the most spammed geography, with a spam rate of 82.2 percent, overtaking Russia, which moved into second position.
  • In the U.S., 73.7 percent of email was spam and 72.0 percent in Canada.
  • The spam level in the U.K. was 72.6 percent. 
  • In The Netherlands, spam accounted for 73.0 percent of email traffic, 71.8 percent in Germany, 71.9 percent in Denmark and 70.4 percent in Australia.
  • In Hong Kong, 72.2 percent of email was blocked as spam and 71.2 percent in Singapore, compared with 69.2 percent in Japan. Spam accounted for 72.3 percent of email traffic in South Africa and 73.4 percent in Brazil.

Symantec Corp. (Nasdaq: SYMC) recently announced the publication of its June 2011 Symantec Intelligence Report, the first Symantec report to combine the research and analysis from the Symantec.cloud MessageLabs Intelligence Report and the Symantec State of Spam & Phishing Report. This month's analysis reveals that spam is currently at the lowest level it has been since the takedown of McColo, a California-based ISP which hosted command and control channels for a number of major botnets, in November 2008.

Since the shutdown of Rustock, the largest spam-sending botnet, in March 2011, the volume of spam in global circulation each day continues to fluctuate. Spam accounted for 72.9 percent of email in June, returning to the same level as in April earlier this year. According to Symantec Intelligence, 76.6 percent of this spam was sent by botnets, compared with 83.1 percent in March.

“Despite the decrease in botnet spam this month, they should still be considered a dangerous force on the Internet. Cyber criminals continue to use botnets to conduct distributed denial of service attacks (DDoS), carry out fraudulent click-thrus on unsuspecting websites for financial gain, host illegal website content on infected computers, harvest personal data from infected users and install spyware to track victims' activities online,” said Paul Wood, senior intelligence analyst, Symantec.cloud.

“Spam remains a huge problem and spam levels continue to be unpredictable. Following the disruption of Rustock in March, approximately 36.9 billion spam emails were in circulation each day during April. This number rose to 41.7 billion in May, before falling back to 39.2 billion in June. During the same period last year, spam accounted for 121.5 billion emails in global circulation each day, equivalent to 89.3 percent of email traffic in June 2010. Over a twelve month period, a drop of 68.7 percent in volume resulted in a fall of only 16.4 percentage points in the overall global spam rate,” added Wood.

In the latest analysis, spam relating to pharmaceutical products accounted for 40 percent of all spam in June 2011, declining from 64.2 percent at the end of 2010. Spam subject line analysis shows that adult spam continues to flourish.

According to the Symantec Intelligence Report, spam messages promoting pharmaceutical products have been the most commonly seen spam attacks in June. Pharmaceutical products are deceptively marketed through spam emails employing a variety of obfuscation techniques. This month’s report highlights the changing nature of the spam-sending botnet landscape and online pharmacy spam using two different angles: a spoof of an online video sharing service and a new online pharmacy brand, perhaps seeking to exploit the popularity of the “wiki” name in a number of high-profile websites.

Last month, Symantec Intelligence also identified a new spam tactic being used, which introduced the “Wiki” name prefix for the promotion of fake pharmaceutical products relating to a new pharmacy brand, WikiPharmacy. The “Subject:” line in these attacks has a lot of randomization contained in the text. The “From:” header is either fake or a hijacked ISP account that gives a personalized appearance to the email.

More Slideshows:

Salary Negotiations: Insider Secrets Recruiter reveals insider's secrets to getting paid what you want.

Eight FREE BlackBerry Productivity Apps Top-rated free apps from the BlackBerry App World.

Ten Cool Gadgets When You're on the Go Hot new gadgets to add to your collection.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.