Feeds

US tops spam relaying and malware leagues of shame

Land of the free, home of the botnet

Intelligent flash storage arrays

The US hosted more than one third of the websites containing malicious code identified during 2006. The country also relayed more spam than any other nation last year, according to a study by net security firm Sophos.

Sophos's Security Threat Report 2007 reveals that the US hosts 34.2 per cent of malware sample detected last year, closely followed by China (31 per cent of samples). Russia (9.5 per cent of malicious code samples), the Netherlands (4.7 per cent) and the Ukraine (3.2 per cent) are also contributing to the growing problem of the use of hacker-controlled websites to infect surfers. The UK ranked 19th in the chart, with UK-based website hosting 0.5 per cent of all websites containing malicious code.

The number of websites being infected with malware is on the rise, Sophos is currently uncovering an average of 5,000 new URLs hosting malicious code every day, as virus writers are increasingly turning to so-called drive-by-downloads as an alternative to infected email traffic as a preferred means of distributing their wares. The proportion of malware-infected emails fell from one in 44 during 2005 to one in 337 during 2006.

Nearly a third (30 per cent) of malware samples detected by Sophos last year were written in China, according to Sophos. Many of these samples were Trojan horses designed to compromise users' PCs. Around one in six malware strains originating in China are specifically designed to steal passwords from online gamers. By contrast, VXers based in Brazil are responsible for 14.2 per cent of all malware, the majority of which is designed to steal online banking credentials.

Sophos detected 41,536 new pieces of malware in 2006, bringing the total number of malware strains its technology detects to 207,684. Of these new threats, Trojans outnumbered Windows viruses and worms by four to one.

In addition to hosting the largest number of malicious websites, the US continues to top the list of worst spam-relaying nations. Although the country has made progress, 22 per cent of spam messages polluting the internet can be traced back to US machines, a factor largely blamed on widespread infestation of home computers by malware. China (15.9 per cent) and South Korea (7.4 per cent) occupy second and third berths, respectively, in this league of shame.

Sophos reckons up to 90 per cent of all junk mail messages are relayed from zombie computers, compromised machines infected by malware and under the control of hackers. Spammers do not necessarily need to be based in the same country as the infected PCs they use to rely spam, and often aren't, a factor that complicates anti-spam policing efforts. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.