Feeds

Spam drops as legit biz dumps mass email ads: Only the dodgy remain

Small problem: it still makes up two-thirds of email traffic

The Essential Guide to IT Transformation

Spam email was down in volume last year, but junk mail messages still comprise two in three items of electronic communication sent over the interwebs.

Kaspersky Lab reports the portion of spam in email flows was as high as 69.6 per cent in 2013 – which is 2.5 percentage points lower than 2012. The biggest sources of spam were China (23 per cent) and the US (18 per cent), according to the Russian security firm.

The drop in spam mail last year follows a steady decrease since 2010. Kaspersky experts reckons that unscrupulous marketeers are turning away from email because it's becoming a less and less effective medium to promote their dubious wares.

In the last three years, the share of unsolicited messages has fallen by 10.7 per cent. It appears that advertisers increasingly prefer the various types of legitimate online advertising that are now available, which generate higher response rates at lower costs than unsolicited email can offer.

In some spam categories [such as travel and tourism], commercial advertising is being gradually displaced by criminal mailings, such as spam messages advertising illegal goods or pornography.

The percentage of emails with malicious attachments was 3.2 per cent - 0.2 percentage points lower than in 2012. Kaspersky adds that almost a third – 32.1 per cent – of phishing attacks were targeted at social networks. More than occasionally, these malicious missives were disguised as messages from genuine antivirus vendors, featuring attachments contaminated with banking Trojans such as ZeuS.

Darya Gudkova, head of content analysis at Kaspersky Lab, commented: "For the third year in a row the most prevalent malware spread by email were programs that attempted to steal confidential data, usually logins and passwords for internet banking systems. At the same time, however, phishing attacks are shifting from bank accounts to social networking and email."

She added: "This can be partly explained by the fact that today’s email accounts often give access to a lot of content, including email, social networking, instant messaging, cloud storages and sometimes even a credit card."

More details on spam and malicious email trends in 2013 can be found in a blog post on Kaspersky Lab's official Securelist blog here. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.