Report: Other Spam Botnets Taking Over After Rustock’s Demise

Symantec Corp. recently announced the publication of its March 2011 MessageLabs Intelligence Report. Analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of 28.5 percent of global spam sent from all botnets in March.

When the botnet ceased sending spam this month, global spam volumes fell by one-third. Since the notable Rustock takedown, other botnets have stepped up their activities to take advantage of the gap in the market. Bagle has now taken over from Rustock as the most active spam-sending botnet in 2011.

MessageLabs Intelligence identified that global spam volumes fell by 33.6 percent between March 15 and 17 following legal action against command and control hosts used by the Rustock botnet. In the days following the takedown of Rustock, spam accounted for approximately 33 billion emails per day, compared with an average of 52 billion per day in the previous week.

"It remains to be seen whether the criminals behind Rustock will be able to recover from this coordinated effort against what has become one of the most technically sophisticated botnets in recent years," said MessageLabs Intelligence Senior Analyst, Symantec.cloud, Paul Wood. "Rustock has been a significant part of the botnet and malware landscape since January 2006, much longer than many of its contemporaries."

Notably, Bagle did not appear in the top 10 spam-sending botnets at the end of 2010 as reported in the MessageLabs Intelligence 2010 Annual Security Report. By the end of 2010, Rustock had been responsible for as much as 47.5 percent of all spam, sending approximately 44.1 billion e-mails per day.

Also in March, MessageLabs Intelligence analyzed the spam traffic from the top ten major spam sending botnets. Since the end of 2010, the more-active Bagle botnet has sent approximately 8.31 billion spam emails each day, the majority linking back to pharmaceutical products. Bagle does not have as many bots under its control, or spikes of traffic as large and dominating as Rustock, but its output has been more consistent.

In March 83.1 percent of global spam was sent from botnets, an increase of 6.1 percentage points compared with the 77 percent at the end of 2010. During 2010, botnets sent an average of 88.2 percent of global spam.

"Botnets have been and remain a destructive resource for cyber criminals and through the years have become the spammers' air-supply, without which it would be very difficult for them to operate. Botnets are also used for other purposes such as launching distributed denial of service attacks, hosting illegal web site content on infected computers (known as bots), harvesting personal data from them and installing spyware to track the activities of their users," Wood said.

Other report highlights:

Spam: In March 2011, the global ratio of spam in email traffic from new and previously unknown bad sources decreased by 2 percent (1 in 1.26 emails).

Viruses: The global ratio of email-borne viruses in email traffic from new and previously unknown bad sources was one in 208.9 emails (0.479 percent) in March, an increase of .134 percentage points since February. In March, 63.4 percent of email-borne malware contained links to malicious websites, a decrease of .1 percentage points since February.

Endpoint Threats: The endpoint is often the last line of defense and analysis. The threats found here can shed light on the wider nature of threats confronting businesses, especially from blended attacks. Attacks reaching the endpoint are likely to have already circumvented other layers of protection that may already be deployed, such as gateway filtering.

Threats against endpoint devices such as laptops, PCs and servers may penetrate an organization in a number of ways, including drive-by attacks from compromised websites, Trojan horses and worms that spread by copying themselves to removable drives. Analysis of the most frequently blocked malware for the last month revealed that the Sality.AE virus was once again the most prevalent. Sality.AE spreads by infecting executable files and attempts to download potentially malicious files from the Internet.

MessageLabs deployed techniques such as heuristic analysis and generic detection, to correctly identify and block several variants of the same malware families, as well as identify new forms of malicious code that seek to exploit certain vulnerabilities that can be identified generically. Approximately 15.7 percent of the most frequently blocked malware last month was identified and blocked in this way, using endpoint security protection.

Phishing: In March, phishing activity was 1 in 252.5 emails (0.396 percent), a decrease of 0.065 percentage points since February.

Web security: Analysis of web security activity shows that an average of 2,973 websites each day were harbouring malware and other potentially unwanted programs including spyware and adware, a decrease of 27.5 percent since February. 37 percent of malicious domains blocked were new in March, a decrease of 1.9 percentage points since February. Additionally, 24.5 percent of all web-based malware blocked was new in March, a decrease of 4.2 percentage points since last month.

Geographical Trends:

  • Oman became the most spammed in March with a spam rate of 87.9 percent.
  • In the U.S. 79.6 percent of email was spam and 79.4 percent in Canada. The spam level in the UK was 79.1 percent.
  • In The Netherlands, spam accounted for 80.2 percent of email traffic, while spam levels reached 80 percent in Germany, 78.9 percent in Denmark and 78.8 percent in Australia.
  • Spam levels in Hong Kong reached 80.6 percent and 77.7 percent in Singapore. Spam levels in Japan were 76.4 percent.
  • In South Africa, spam accounted for 79.5 percent of email traffic.
  • Luxembourg became the most targeted by email-borne malware with 1 in 26.2 emails blocked as malicious in March. The sharp increase was a result of a large number of variants of Bredolab, Zeus and SpyEye malware, which was observed in a number of other countries, including South Africa.
  • In the UK, 1 in 98.8 emails contained malware. In the US virus levels were 1 in 507.9 and 1 in 160.1 for Canada. In Germany, virus levels reached 1 in 352.7, 1 in 916.8 in Denmark and 1 in 467.1 for The Netherlands.
  • In Australia, 1 in 261.0 emails were malicious and, 1 in 357.3 for Hong Kong, for Japan it was 1 in 1,015 compared with 1 in 823.8 for Singapore.
  • In South Africa 1 in 76.9 emails contained malicious content.

 Vertical Trends:

  • In March, the most spammed industry sector with a spam rate of 82.3 percent continued to be the Automotive sector.
  • Spam levels for the Education sector were 81 percent, 79.6 percent for the Chemical & Pharmaceutical sector, 79.8 percent for IT Services, 78.8 percent for Retail, 78.1 percent for Public Sector and 78 percent for Finance.
  • In March, Government/Public Sector remained the most targeted industry for malware with 1 in 27 emails being blocked as malicious.
  • Virus levels for the Chemical & Pharmaceutical sector were 1 in 302.2, 1 in 326.5 for the IT Services sector, 1 in 397 for Retail, 1 in 109.6 for Education and 1 in 318.9 for Finance.

Featured

  • 7 Reasons Why Governments Need to Regulate AI

    Recently, Elon Musk unveiled two remarkable AI applications. A humanoid robot named Optimus, with its remarkable human-like speech and movements, and a fully autonomous car, absent steering wheel and pedals, called Cybercab. While these examples represent a broad trend of AI integration across industries, they highlight technology’s transformative potential, prompting a need for regulation to ensure it is used responsibly, securely and ethically. Read Now

  • OR Code Phishing on the Rise According to New Report

    KnowBe4 recently released its Q3 2024 Phishing Report. This quarter's findings reveal the most frequently clicked email subjects in simulated phishing tests, demonstrating the continued efficacy of HR and IT-related phishing attempts. KnowBe4’s Q3 2024 Phishing Report reveals that HR and IT-related phishing emails claim a significant 48.6% share of top-clicked phishing types globally. Despite evolving techniques by bad actors, phishing emails remain among the most prevalent tools for executing cyberattacks. Read Now

  • United HealthCare CEO Killed in Targeted Attack in New York City

    United HealthCare CEO Brian Thompson was killed in a targeted attack early Wednesday in Manhattan Read Now

  • Theft, Crime Driving Retail Workers to Look for New Jobs

    More than four in ten retail workers in the U.S. say they are likely to leave their current job in the next 12 months due to personal safety concerns, according to new research conducted by the Loss Prevention Research Council (LPRC) in partnership with Verkada. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3