Tag Archive for SPAM

16x Increase in Malware Threats

16x Increase in Malware ThreatsThe last six months have seen a gradual decrease in the amount of SPAM and malware hitting my account. An average of 44.3 SPAM messages per day (SM/D) were blocked by the SPAM filter for my account in October.

 

2009 Daily Average SPAM

This is a decline in SM/D from a high of 77.5 in May. This is also below the year-to-date SM/D of 54.7.

While the overall SM/D trend may be declining another trend is developing that is more dangerous. Since August 2009, the amount of SPAM containing malware has increased dramatically. For the first six months of 2009, there were only 24 SPAM messages that contained malware. This represents .11 malware-laden messages per day.  Since August 1st there have been 188 SPAM messages containing malware to date. This equates to 1.8 SPAM messages with a malware payload per day. This represents a 16X increase in malware trying to attack my PC daily. The most common malware was the Bredo family of Trojans, followed by the Kryptik Trojans and then various Fake Alert Trojans.

2009 Malware Types

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

SPAM Continues to Grow

SPAM Continues to GrowDespite some recent victories in the struggle against spam, like the takedowns of McColo and PriceWert micro-analysis of spam trends confirms the continuing surge of spam. The overall trend over the last 12 months in spam volume is still headed up. This upward trend continues despite a year-long decline in the trend from April 2008 to April 2009, a trend Google also noted.

May 2009 saw a doubling of the spam received which moved the trend line up. The amount of spam in June 2008 fell back within the expected range, which coaxed the trend higher. If the amount of SPAM received in July 2009 stays at the average projected levels, the trend will continue to climb, which Google describes as  “the recent upward trajectory of spam ”

SPAM history

These results are based on spam statistics from my business email account. The practice of safer emailing, which includes the judicious use of email filters, anti-malware software on the desktop a hosted email server and Gmail helps keep spam under control. Whenever I conduct business with an unknown entity, they always get a GMail address until I know it is safe to transact business with them.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Audio SPAM in Your Luxury Import

Audio SPAM in Your Luxury Import

Toyota has announced that new Lexus vehicles will start being delivered later this year. The luxury car comes equipped with a system that can send voice messages sent directly from the automaker to its drivers. The “service” called Lexus Insider will let Lexus send audio messages to owners on whatever subject it chooses.

verbal spamReports say the tips could range from making the best use of the vehicles’ features to suggestions for a scenic drive. Jon Bucci, vice president of Toyota’s U.S. advanced technology unit says the Lexus messages can be highly targeted. The messages can be tailored for those who have a specific vehicle type or who live in a particular ZIP code, which seems like verbal spam to me.

William Matthies of Coyote Insight and a longtime consumer electronics executive opined in USA Today.  “You’ve got the same thing coming to your home now. It strikes me as the same thing” as junk mail. Assertions that the messages will be targeted and useful enough to appeal to particular drivers don’t impress Mr. Matthies. “They’re not claiming anything different than all direct marketers claim,” he says.

Perhaps, Toyota will drop the price of a Lexus, now that its customers are a captive audience to their marketing machine.

Related articles
  • Lexus: Made in America? (features.blogs.fortune.cnn.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Online Security Threats Growing

Online Security Threats GrowingDarkReading is reporting that Ann Arbor-based Arbor Networks has issued its fourth Worldwide Infrastructure Security Report. The global report is based on responses from 70 lead security engineers worldwide. Some of the report’s findings are that DDoS attacks have grown a hundredfold since 2000 and the newest threat is increasing service-level attacks

Arbor Networks logoRespondents to the survey said the main threat vectors for attacks experienced during August 2007 to July 2008, were:

  • external, brute force attacks (61%)
  • known vulnerabilities (12 %)
  • social engineering (3%)
  • misconfiguration (3%)
  • none from zero-day threats.

Brute force attacks, such as DDoS, jumped 67 percent over the last year. ISPs reportedly spent most of their available security resources combating distributed denial of service (DDoS) attacks. Flood-based attacks represented 42 percent of the attacks reported and protocol exhaustion-based attacks at 24 percent last year. DDoS attacks have grown from megabit levels in 2000 to 40-gigabit attacks this year. Nearly 60 percent of ISPs worldwide say they experienced DDoS attacks larger than 1 gigabit-per-second (Gbps) to a record 40 Gbps, according to Arbor’s report. Arbor also indicates the growth in attack size continues to significantly outpace the corresponding increase in underlying transmission speed and ISP infrastructure investment according to Danny McPherson, chief security officer for Arbor Networks.

Bandwidth bottleneckThe report indicates that the ISPs surveyed are less worried about DDoS attacks than they were a year ago. This year ISPs describe a far more diversified range of threats, more than half are battling an increase in service-level attacks which accounted for 17 percent of all attacks, that attempt to exploit vulnerabilities and limitations of computing resources. New attacks are being directed at new services, as ISP’s work to diversify their income sources by expanding into content distribution, VoIP or other managed services. These new threats include:

  • domain name system (DNS) spoofing
  • border gateway protocol (BGP) hijacking
  • spam.

Almost half of the surveyed ISPs now consider their DNS services vulnerable. Others expressed concern over related service delivery infrastructure, including voice over IP (VoIP) session border controllers (SBCs) and load balancers. Several ISPs reported multi-hour outages of prominent Internet services during the last year due to application-level attacks.

Botnets are still a big problem for ISPs. Botnets continue their expansion across the Internet. ISP’s report that botnet used for:

  • SPAM (36%)
  • DDoS (31%)
  • phishing (28%)
  • ID fraud (>5%)
  • click fraud (>5%)

Rob Malan, founder and chief technology officer of Arbor Networks explained that, with application-based attacks, bot-infected computers worldwide make connections to a targeted site, then “use an application protocol to deliver a perfectly valid request, not a vulnerability, not something that an IDS or other type of firewall would necessarily flag”. For example, a botnet might instruct its zombie computers worldwide to do a back-end query off a database. “By itself, it’s not bad but, if you have multiple such requests, then you tie up the application – in this case, database – resources on the back-end,” he said.

Even the newest technologies are not secure, 55 percent of ISPs see the scale and frequency of IPv6 attacks increasing. “They are asked to deploy V6, but they don’t feel they can have security [with it],” Dr. Craig Labovitz chief scientist for Arbor Networks says. Today’s IPS/IDS, firewall, and other tools don’t have the proper visibility into IPv6 networks to secure them, he says. Arbor Networks released an earlier study in August 2008 which revealed negligible IPv6 usage.

The response capability of the respondents is mixed. The majority of ISPs report that they can detect DDoS attacks using tools. This year also shows significant adoption of inline mitigation infrastructure and a migration away from less discriminate techniques like blocking all customer traffic (including legitimate traffic) via routing announcements. Many ISPs also report deploying walled-garden and quarantine infrastructure to combat botnets.

Despite the tools, on hand, only a few of the surveyed ISPs said they have the capability to mitigate DDoS attacks in 10 minutes or less. Even fewer providers have the infrastructure to defend against service-level attacks or this year’s reported peak of a 40-gigabit flood attack.

Even less of an emphasis is placed on finding the criminals responsible for these attacks. Arbor Networks found that ISPs have faith in law-enforcement bodies. Nearly two-thirds of respondents indicated that they do not believe law enforcement has the means to act upon the information they provide about attacks or other security incidents. “It’s hard on carriers,” said Malan. “They get paid on traffic, not to do forensic analysis. So it’s hard from their perspective to make the economics work.”

The Arbor Networks 2008 Worldwide Infrastructure Security Report describes a networked world where DDoS attacks growth has outpaced the ability of firms to respond to them and new service level attacks are driven by botnet’s are matching the firm’s efforts to diversify their service offerings to customers. These facts when combined with the current economic recession, the networked world still appears to be a difficult place to do business.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.