U.S. takes title as top spam-relaying nation in Q2
The good effects of CAN-SPAM appear to be diminishing
Computing South Africa - Sophos has published a report on the top 12 spam-relaying countries over the second quarter of 2006.
Experts at SophosLabs scanned all spam messages received in the company's global network of spam traps, revealing that for the first time in more than two years, the U.S. has failed to make inroads into its spam-relaying problem. The U.S. remains stuck at the top of the chart and is the source of 23.2% of the world's spam. Its closest rivals are China and South Korea, although both of these nations have managed to reduce their statistics since Q1 2006.
The vast majority of this spam is relayed by "zombies," also known as botnet computers, hijacked by Trojan horses, worms and viruses under the control of hackers.
The top 12 spam-relaying countries between April and June 2006 are as follows:
- U.S. -- 23.2%
- China (including Hong Kong) -- 20%
- South Korea -- 7.5%
- France -- 5.2%
- Spain -- 4.8%
- Poland -- 3.6%
- Brazil -- 3.1%
- Italy -- 3%
- Germany -- 2.5%
- U.K. -- 1.8%
- Taiwan -- 1.7%
- Japan -- 1.6%
Others -- 22%
Sophos noted that spam is even being relayed from the Vatican and Antarctica.
Since the introduction of the CAN-SPAM legislation in 2004, there has been a regular quarter-on-quarter drop in the proportion of spam coming from the U.S. -- until now.
"It is difficult to criticize the U.S. for failing to take action, given the number of arrests and the huge fines for guilty spammers. The likely reality is that these statistics will not drop unless U.S. home users take action to secure their computers and put a halt to the zombie PC problem," said Brett Myroff, CEO of master Sophos distributor NetXactics.
Even though Russia does not feature in the dirty dozen of spam-relaying countries, Sophos has uncovered evidence that Russian spammers may be controlling vast networks of zombie PCs. Sophos recently discovered a Russian spamming price list, which showed that $500 would purchase e-mail distribution to 11 million Russian e-mail addresses. On top of this, companies could buy distribution to 1 million addresses in any country they wanted for just $50.
One key development in 2006 so far has been the increase in spam containing embedded images, which has risen sharply from 18.2% in January to 35.9% in June. By using images instead of text, messages are able to avoid detection by some antispam filters that rely on the analysis of textual spam content.
Sophos estimates that 15% of all spam e-mails are now pump-and-dump scams, compared to just 0.8% in January 2005. These scams are e-mail campaigns designed to boost the value of a company's stock in order for spammers to make a quick profit. Many of these spam messages contain images rather than traditional text.
"It is always a concern to see so many pump-and-dump e-mails, particularly as the people acting on these e-mails are not skilled investors. They do not realize that purchasing the shares will not reap any rewards, and benefits only the spammers, while creating a financial roller coaster for the organization in question," says Myroff.
Sophos recommends that computer users ensure that they keep their security software up to date, as well as using a properly configured firewall and installing the latest operating system security patches. Businesses must also look to implement a best-practice policy regarding e-mail account usage.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts