SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
January 2010                                                                                           Report #37

        Notable highlights from December 2009 include the shift in the region of spam message origin
        and changes in the average size of spam messages. In recent months, APJ and South America
        have been taking spam share away from the traditional leaders of North America and EMEA.
        However, North America and EMEA together sent 57 percent of spam messages in December
        2009, compared with 50 percent in November 2009.

        With respect to the average size of the messages, the 2kb- 5kb message size category increased
        by 7 percent points, while the 5kb-10kb message size category decreased by 6 percent points in
        December 2009. This change corresponds with a decrease in attachment spam. Attachment
        spam averaged at 4.48 percent in December 2009, compared with 5.28 percent in November
        2009. With respect to all spam categories, health and product spam have increased, and now
        account for 52 percent of all spam messages.

        The following trends are highlighted in the January 2010 report:
            Xmas Card, Loaded with Malware
            Your Bank Has Declared Bankruptcy
            Pills From Amazon?
            December 2009: Spam Subject Line Analysis
            “Dotted Quad” Spam Shows Sign of Eruption
            Andy Lau Talks Chinese Invoice Spam




        Dylan Morss                   Eric Park                       Sagar Desai
        Executive Editor              Editor                          PR contact
        Antispam Engineering          Antispam Engineering            sagar_desai@symantec.com
Xmas Card, Loaded with Malware

Last month’s State of Spam Report highlighted top seasonal subject lines as the holidays ap-
proached. Once again, Symantec researchers have monitored the typical holiday spam, rang-
ing from replica goods and online pharmacy products to Nigerian-type scams. It was interest-
ing to see a spam message pretending to be a holiday greeting card from a financial institu-
tion.




It is also important to note that this spam message can be easily changed into a phishing/fraud
message. This could be accomplished by making minor changes to the email message source.
Your Bank Has Declared Bankruptcy

Due to current recession, the FDIC (Federal Deposit Insurance Corporation) has closed many
failed banks. By mid-December, there were 140 banks in 2009 closed by the FDIC. Given the
amount of press coverage such news garners in the media, it is no surprise that spammers are
taking advantage of this trend for their benefit.




In the example above, spammers are claiming that the bank has declared bankruptcy. When
the user clicks on the provided link to “learn how to save money,” Trojan.Pidief tries to install
itself on the machine.

Symantec advises users to check reliable news outlets as well as the official FDIC website to
determine whether the banks indeed have been taken over by the government. As this exam-
ple shows, spammers continue to look for ways to increase the chances of their messages be-
ing opened by users. Symantec expects such techniques to continue in 2010.
Pills from Amazon?

Spammers have been taking advantage of various “freeweb” services in an effort to bypass
filters. Some have used URL shortening services to mask the true destination URL while others
have abused a variety of social networking sites/tools by creating a profile that is really a spam
campaign.

While Symantec researchers have monitored spam which purported to be from Amazon, this
particular spam message was different in that the spammer actually created an account on the
retailer’s website. Then, the spammer sent the message via Amazon’s email system with its
links.




When users click on the link provided in the message, they are directed to the Amazon web-
site.
December 2009: Spam Subject Line Analysis

In December 2009, the top ten subject lines used by spammers were dominated by a mixture
of Nigerian type and online pharmacy spam. This correlates to doubling of “health” category
from 8 percent in November 2009 to 16 percent in December 2009. Meanwhile, NDR bounce
spam, which appeared on the previous month’s list, averaged at 1.28 percent of all spam
(accounted for 2.23 percent in November). Spam messages containing malware also fell, aver-
aging 0.32 percent of all spam messages (accounted for 1.35 percent in November).
“Dotted Quad” Spam Shows Signs of Eruption

Symantec researchers are observing an unusually large increase in volume of spam containing
hijacked IPs. Furthermore, review of spam with hijacked IPs indicates that one specific attack
was responsible for this volume change.

Spam messages with hijacked IPs more than tripled in December 2009, compared with the vol-
ume in November 2009. While this type of attack makes up a very small chunk of overall spam
messages, there were certain periods in December when “dotted quad” spam accounted for a
significant percentage. For example, such spam was over 25 percent of overall spam during
the hour of 6:00 am PST on December 24th.

Symantec researches investigated such spikes and found consistency among the spam mes-
sages. A particular spam attack leading users to online pharmacy sites was using hijacked IPs
in its campaign.




As always, users cannot be certain whether the medications are genuine, if they are even de-
livered in the first place. Worse, there is a high possibility that users who order through these
sites become victims of identity theft. Users are advised to consult with their doctors for their
health needs.
Andy Lau Talks Chinese Invoice Spam

While invoice spam makes up a large slice of Chinese spam, the message often contains plain
text-based advertisement (although the text may be an image). In this example below, spam-
mers are leveraging a celebrity’s status by using Andy Lau’s image.




Users should not be calling a number featured on spam for invoice, regardless of who is speaking.
Checklist: Protecting your business, your employees and your customers

Do
    Unsubscribe from legitimate mailings that you no longer want to receive. When signing up
     to receive mail, verify what additional items you are opting into at the same time. De-
     select items you do not want to receive.
    Be selective about the Web sites where you register your email address.
    Avoid publishing your email address on the Internet. Consider alternate options – for ex-
     ample, use a separate address when signing up for mailing lists, get multiple addresses for
     multiple purposes, or look into disposable address services.
    Using directions provided by your mail administrators report missed spam if you have an
     option to do so.
    Delete all spam.
    Avoid clicking on suspicious links in email or IM messages as these may be links to spoofed
     websites. We suggest typing web addresses directly in to the browser rather than relying
     upon links within your messages.
    Always be sure that your operating system is up-to-date with the latest updates, and em-
     ploy a comprehensive security suite. For details on Symantec’s offerings of protection visit
     http://www.symantec.com.
    Consider a reputable antispam solution to handle filtering across your entire organization
     such as Symantec Brightmail messaging security family of solutions.
    Keep up to date on recent spam trends by visiting the Symantec State of Spam site which is
     located here.

Do Not
 Open unknown email attachments. These attachments could infect your computer.
 Reply to spam. Typically the sender’s email address is forged, and replying may only result
   in more spam.
 Fill out forms in messages that ask for personal or financial information or passwords. A
   reputable company is unlikely to ask for your personal details via email. When in doubt,
   contact the company in question via an independent, trusted mechanism, such as a veri-
   fied telephone number, or a known Internet address that you type into a new browser
   window (do not click or cut and paste from a link in the message).
 Buy products or services from spam messages.
 Open spam messages.
 Forward any virus warnings that you receive through email. These are often hoaxes.
Metrics Digest: Regions of Origin

Defined: Region of origin represents the percentage of spam messages reported coming from
certain regions and countries in the last 30 days.
Metrics Digest: URL TLD Distribution




Metrics Digest: Average Spam Message Size




Metrics Digest: Spam Attack Vectors
Metrics Digest: Global Spam Categories:




   Internet Email attacks specifically offering or        Fraud Email attacks that appear to be from a
    advertising Internet or computer-related                well-known company, but are not. Also known
    goods and services. Examples: web hosting,              as “brand spoofing” or “phishing,” these mes-
    web design, spamware                                    sages are often used to trick users into reveal-
   Health Email attacks offering or advertising            ing personal information such as E-mail ad-
    health-related products and services. Exam-             dress, financial information and passwords.
    ples: pharmaceuticals, medical treatments,              Examples: account notification, credit card
    herbal remedies                                         verification, billing updates
   Leisure Email attacks offering or advertising          419 spam Email attacks is named after the
    prizes, awards, or discounted leisure activities.       section of the Nigerian penal code dealing
    Examples: vacation offers, online casinos               with fraud, and refers to spam email that typi-
   Products Email attacks offering or advertising          cally alerts an end user that they are entitled
    general goods and services. Examples: devices,          to a sum of money, by way of lottery, a retired
    investigation services, clothing, makeup                government official, lottery, new job or a
   Financial Email attacks that contain refer-             wealthy person that has that has passed away.
    ences or offers related to money, the stock             This is also sometimes referred to as advance
    market or other financial “opportunities.” Ex-          fee fraud.
    amples: investments, credit reports, real es-          Political Email attacks Messages advertising a
    tate, loans                                             political candidate’s campaign, offers to do-
                                                            nate money to a political party or political

   Adult Email attacks containing or referring to products or services intended for persons above the
    age of 18, often offensive or inappropriate. Examples: porn, personal ads, relationship advice

Weitere ähnliche Inhalte

Was ist angesagt?

Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketinghey4ndr3w
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaPriyanka Aash
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017malvvv
 
2012 Cost of Cyber Crime Study: Japan
2012 Cost of Cyber Crime Study: Japan2012 Cost of Cyber Crime Study: Japan
2012 Cost of Cyber Crime Study: JapanJitendra Adhikari
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 

Was ist angesagt? (12)

Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketing
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social Media
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
2012 Cost of Cyber Crime Study: Japan
2012 Cost of Cyber Crime Study: Japan2012 Cost of Cyber Crime Study: Japan
2012 Cost of Cyber Crime Study: Japan
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
The EDGE: Week of April 04, 2011
The EDGE: Week of April 04, 2011The EDGE: Week of April 04, 2011
The EDGE: Week of April 04, 2011
 
Web spam
Web spamWeb spam
Web spam
 

Andere mochten auch

Is Outsource Marketing Right for Your Company?
Is Outsource Marketing Right for Your Company?Is Outsource Marketing Right for Your Company?
Is Outsource Marketing Right for Your Company?Clarity Quest Marketing
 
"A World Of Connections" - Special Report on Social Networking (The Economist)
"A World Of Connections" - Special Report on Social Networking (The Economist)"A World Of Connections" - Special Report on Social Networking (The Economist)
"A World Of Connections" - Special Report on Social Networking (The Economist)Matthew Pantoja
 
Social networks based on amit sharma report
Social networks  based on amit sharma reportSocial networks  based on amit sharma report
Social networks based on amit sharma reportchizhovka
 
A presentation on "Steve Jobs".
A presentation on "Steve Jobs".A presentation on "Steve Jobs".
A presentation on "Steve Jobs".VisualBee.com
 
Spamcheetah spam filter/mail security gateway manual
Spamcheetah spam filter/mail security gateway manualSpamcheetah spam filter/mail security gateway manual
Spamcheetah spam filter/mail security gateway manualGirish Venkatachalam
 
So you want to write a technical paper!
So you want to write a technical paper!So you want to write a technical paper!
So you want to write a technical paper!George Earle
 
Pulitzer Center and Student News Action Network Powerpoint
Pulitzer Center and Student News Action Network PowerpointPulitzer Center and Student News Action Network Powerpoint
Pulitzer Center and Student News Action Network PowerpointMark Schulte
 
Preinforme goverment at glance 2013
Preinforme goverment at glance 2013Preinforme goverment at glance 2013
Preinforme goverment at glance 2013Observatoriodigital
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Symantec Italia
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Italia
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Symantec Italia
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoSymantec Italia
 
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniSymantec Italia
 
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Symantec Italia
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webSymantec Italia
 
2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research ReportPrayukth K V
 
Report on railway accidents in mumbai with case study
Report on railway accidents in mumbai with case studyReport on railway accidents in mumbai with case study
Report on railway accidents in mumbai with case studyChaitrali Ahire
 
A project report on customer satisfaction on vijay karnatakanews paper
A project report on customer satisfaction on vijay karnatakanews paperA project report on customer satisfaction on vijay karnatakanews paper
A project report on customer satisfaction on vijay karnatakanews paperBabasab Patil
 

Andere mochten auch (20)

Is Outsource Marketing Right for Your Company?
Is Outsource Marketing Right for Your Company?Is Outsource Marketing Right for Your Company?
Is Outsource Marketing Right for Your Company?
 
"A World Of Connections" - Special Report on Social Networking (The Economist)
"A World Of Connections" - Special Report on Social Networking (The Economist)"A World Of Connections" - Special Report on Social Networking (The Economist)
"A World Of Connections" - Special Report on Social Networking (The Economist)
 
Social networks based on amit sharma report
Social networks  based on amit sharma reportSocial networks  based on amit sharma report
Social networks based on amit sharma report
 
A presentation on "Steve Jobs".
A presentation on "Steve Jobs".A presentation on "Steve Jobs".
A presentation on "Steve Jobs".
 
Spamcheetah spam filter/mail security gateway manual
Spamcheetah spam filter/mail security gateway manualSpamcheetah spam filter/mail security gateway manual
Spamcheetah spam filter/mail security gateway manual
 
So you want to write a technical paper!
So you want to write a technical paper!So you want to write a technical paper!
So you want to write a technical paper!
 
Pulitzer Center and Student News Action Network Powerpoint
Pulitzer Center and Student News Action Network PowerpointPulitzer Center and Student News Action Network Powerpoint
Pulitzer Center and Student News Action Network Powerpoint
 
Preinforme goverment at glance 2013
Preinforme goverment at glance 2013Preinforme goverment at glance 2013
Preinforme goverment at glance 2013
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodotto
 
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
 
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del web
 
Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?
 
2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report2013 State of Social Media Spam Research Report
2013 State of Social Media Spam Research Report
 
Report on railway accidents in mumbai with case study
Report on railway accidents in mumbai with case studyReport on railway accidents in mumbai with case study
Report on railway accidents in mumbai with case study
 
A project report on customer satisfaction on vijay karnatakanews paper
A project report on customer satisfaction on vijay karnatakanews paperA project report on customer satisfaction on vijay karnatakanews paper
A project report on customer satisfaction on vijay karnatakanews paper
 

Ähnlich wie Spam Report Gennaio 2010

Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCReturn Path
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedYes Lifecycle Marketing
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamAlexander Decker
 
Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Ralph Paglia
 

Ähnlich wie Spam Report Gennaio 2010 (20)

Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Cb Threat Report
Cb Threat ReportCb Threat Report
Cb Threat Report
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Spam
SpamSpam
Spam
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths Debunked
 
Phishing
PhishingPhishing
Phishing
 
internet security
internet securityinternet security
internet security
 
Spam!
Spam!Spam!
Spam!
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Final paper
Final paperFinal paper
Final paper
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1
 
139 digital dealer6emailiskillingyouv1
139 digital dealer6emailiskillingyouv1139 digital dealer6emailiskillingyouv1
139 digital dealer6emailiskillingyouv1
 
Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1Digital dealer6 emailiskillingyou-v1
Digital dealer6 emailiskillingyou-v1
 

Mehr von Symantec Italia

Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Italia
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiSymantec Italia
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Symantec Italia
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Italia
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009Symantec Italia
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSymantec Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...Symantec Italia
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Italia
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Italia
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Italia
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Italia
 
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Italia
 
Symantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Italia
 
Symantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Italia
 
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerAgenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerSymantec Italia
 
Proteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiProteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiSymantec Italia
 

Mehr von Symantec Italia (19)

Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business Server
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequenti
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIV
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequenti
 
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
 
Symantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows Servers
 
Symantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequenti
 
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerAgenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
 
Proteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiProteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciuti
 
SMB Protection Guide
SMB Protection GuideSMB Protection Guide
SMB Protection Guide
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Spam Report Gennaio 2010

  • 1. January 2010 Report #37 Notable highlights from December 2009 include the shift in the region of spam message origin and changes in the average size of spam messages. In recent months, APJ and South America have been taking spam share away from the traditional leaders of North America and EMEA. However, North America and EMEA together sent 57 percent of spam messages in December 2009, compared with 50 percent in November 2009. With respect to the average size of the messages, the 2kb- 5kb message size category increased by 7 percent points, while the 5kb-10kb message size category decreased by 6 percent points in December 2009. This change corresponds with a decrease in attachment spam. Attachment spam averaged at 4.48 percent in December 2009, compared with 5.28 percent in November 2009. With respect to all spam categories, health and product spam have increased, and now account for 52 percent of all spam messages. The following trends are highlighted in the January 2010 report:  Xmas Card, Loaded with Malware  Your Bank Has Declared Bankruptcy  Pills From Amazon?  December 2009: Spam Subject Line Analysis  “Dotted Quad” Spam Shows Sign of Eruption  Andy Lau Talks Chinese Invoice Spam Dylan Morss Eric Park Sagar Desai Executive Editor Editor PR contact Antispam Engineering Antispam Engineering sagar_desai@symantec.com
  • 2. Xmas Card, Loaded with Malware Last month’s State of Spam Report highlighted top seasonal subject lines as the holidays ap- proached. Once again, Symantec researchers have monitored the typical holiday spam, rang- ing from replica goods and online pharmacy products to Nigerian-type scams. It was interest- ing to see a spam message pretending to be a holiday greeting card from a financial institu- tion. It is also important to note that this spam message can be easily changed into a phishing/fraud message. This could be accomplished by making minor changes to the email message source.
  • 3. Your Bank Has Declared Bankruptcy Due to current recession, the FDIC (Federal Deposit Insurance Corporation) has closed many failed banks. By mid-December, there were 140 banks in 2009 closed by the FDIC. Given the amount of press coverage such news garners in the media, it is no surprise that spammers are taking advantage of this trend for their benefit. In the example above, spammers are claiming that the bank has declared bankruptcy. When the user clicks on the provided link to “learn how to save money,” Trojan.Pidief tries to install itself on the machine. Symantec advises users to check reliable news outlets as well as the official FDIC website to determine whether the banks indeed have been taken over by the government. As this exam- ple shows, spammers continue to look for ways to increase the chances of their messages be- ing opened by users. Symantec expects such techniques to continue in 2010.
  • 4. Pills from Amazon? Spammers have been taking advantage of various “freeweb” services in an effort to bypass filters. Some have used URL shortening services to mask the true destination URL while others have abused a variety of social networking sites/tools by creating a profile that is really a spam campaign. While Symantec researchers have monitored spam which purported to be from Amazon, this particular spam message was different in that the spammer actually created an account on the retailer’s website. Then, the spammer sent the message via Amazon’s email system with its links. When users click on the link provided in the message, they are directed to the Amazon web- site.
  • 5. December 2009: Spam Subject Line Analysis In December 2009, the top ten subject lines used by spammers were dominated by a mixture of Nigerian type and online pharmacy spam. This correlates to doubling of “health” category from 8 percent in November 2009 to 16 percent in December 2009. Meanwhile, NDR bounce spam, which appeared on the previous month’s list, averaged at 1.28 percent of all spam (accounted for 2.23 percent in November). Spam messages containing malware also fell, aver- aging 0.32 percent of all spam messages (accounted for 1.35 percent in November).
  • 6. “Dotted Quad” Spam Shows Signs of Eruption Symantec researchers are observing an unusually large increase in volume of spam containing hijacked IPs. Furthermore, review of spam with hijacked IPs indicates that one specific attack was responsible for this volume change. Spam messages with hijacked IPs more than tripled in December 2009, compared with the vol- ume in November 2009. While this type of attack makes up a very small chunk of overall spam messages, there were certain periods in December when “dotted quad” spam accounted for a significant percentage. For example, such spam was over 25 percent of overall spam during the hour of 6:00 am PST on December 24th. Symantec researches investigated such spikes and found consistency among the spam mes- sages. A particular spam attack leading users to online pharmacy sites was using hijacked IPs in its campaign. As always, users cannot be certain whether the medications are genuine, if they are even de- livered in the first place. Worse, there is a high possibility that users who order through these sites become victims of identity theft. Users are advised to consult with their doctors for their health needs.
  • 7. Andy Lau Talks Chinese Invoice Spam While invoice spam makes up a large slice of Chinese spam, the message often contains plain text-based advertisement (although the text may be an image). In this example below, spam- mers are leveraging a celebrity’s status by using Andy Lau’s image. Users should not be calling a number featured on spam for invoice, regardless of who is speaking.
  • 8. Checklist: Protecting your business, your employees and your customers Do  Unsubscribe from legitimate mailings that you no longer want to receive. When signing up to receive mail, verify what additional items you are opting into at the same time. De- select items you do not want to receive.  Be selective about the Web sites where you register your email address.  Avoid publishing your email address on the Internet. Consider alternate options – for ex- ample, use a separate address when signing up for mailing lists, get multiple addresses for multiple purposes, or look into disposable address services.  Using directions provided by your mail administrators report missed spam if you have an option to do so.  Delete all spam.  Avoid clicking on suspicious links in email or IM messages as these may be links to spoofed websites. We suggest typing web addresses directly in to the browser rather than relying upon links within your messages.  Always be sure that your operating system is up-to-date with the latest updates, and em- ploy a comprehensive security suite. For details on Symantec’s offerings of protection visit http://www.symantec.com.  Consider a reputable antispam solution to handle filtering across your entire organization such as Symantec Brightmail messaging security family of solutions.  Keep up to date on recent spam trends by visiting the Symantec State of Spam site which is located here. Do Not  Open unknown email attachments. These attachments could infect your computer.  Reply to spam. Typically the sender’s email address is forged, and replying may only result in more spam.  Fill out forms in messages that ask for personal or financial information or passwords. A reputable company is unlikely to ask for your personal details via email. When in doubt, contact the company in question via an independent, trusted mechanism, such as a veri- fied telephone number, or a known Internet address that you type into a new browser window (do not click or cut and paste from a link in the message).  Buy products or services from spam messages.  Open spam messages.  Forward any virus warnings that you receive through email. These are often hoaxes.
  • 9. Metrics Digest: Regions of Origin Defined: Region of origin represents the percentage of spam messages reported coming from certain regions and countries in the last 30 days.
  • 10. Metrics Digest: URL TLD Distribution Metrics Digest: Average Spam Message Size Metrics Digest: Spam Attack Vectors
  • 11. Metrics Digest: Global Spam Categories:  Internet Email attacks specifically offering or  Fraud Email attacks that appear to be from a advertising Internet or computer-related well-known company, but are not. Also known goods and services. Examples: web hosting, as “brand spoofing” or “phishing,” these mes- web design, spamware sages are often used to trick users into reveal-  Health Email attacks offering or advertising ing personal information such as E-mail ad- health-related products and services. Exam- dress, financial information and passwords. ples: pharmaceuticals, medical treatments, Examples: account notification, credit card herbal remedies verification, billing updates  Leisure Email attacks offering or advertising  419 spam Email attacks is named after the prizes, awards, or discounted leisure activities. section of the Nigerian penal code dealing Examples: vacation offers, online casinos with fraud, and refers to spam email that typi-  Products Email attacks offering or advertising cally alerts an end user that they are entitled general goods and services. Examples: devices, to a sum of money, by way of lottery, a retired investigation services, clothing, makeup government official, lottery, new job or a  Financial Email attacks that contain refer- wealthy person that has that has passed away. ences or offers related to money, the stock This is also sometimes referred to as advance market or other financial “opportunities.” Ex- fee fraud. amples: investments, credit reports, real es-  Political Email attacks Messages advertising a tate, loans political candidate’s campaign, offers to do- nate money to a political party or political  Adult Email attacks containing or referring to products or services intended for persons above the age of 18, often offensive or inappropriate. Examples: porn, personal ads, relationship advice