SlideShare a Scribd company logo
1 of 10
Download to read offline
March 2010                                                                                             Report #39

       Scam and phishing messages in February accounted for 19 percent of all spam, which is 2 per-
       centage points lower than in January, but nevertheless an elevated level. Spammers continued
       to use the earthquake in Haiti, and the recent earthquake in Chile as another vector to utilize.
       They also used other current high-profile events, such as recent auto recalls, to deliver spam
       messages. Also taking a look at international threats, this reports highlights attacks specific to
       Brazil, China, Russia, and India.

       Symantec observed a 16 percent increase from the previous month in all phishing attacks. This
       was primarily due to an increase in the volume of unique URL and IP attacks. 13 percent of
       phishing URLs were generated using phishing toolkits, an increase of 9 percent from the previ-
       ous month. A 12 percent increase was observed in non-English phishing sites from the previous
       month. There was a significant increase in phishing sites in Italian and French languages. The
       increase in Italian language phishing was attributed to a rise in attacks on three Italian banks.
       Phishing on one Canadian financial institution and one French bank led to the rise in attacks in
       French. More than 98 Web hosting services were used, which accounted for 12 percent of all
       phishing attacks.

       The following trends are highlighted in the March 2010 report:

            Still No Sympathy From Spammers
            Affected by Recalls? Spammers Want to Know
            Will the Trend Continue?
            International Spam & Phishing Roundup
            Phishing the Brands of Online Auction Marketing Tools
            February 2010: Spam Subject Line Analysis




        Dylan Morss                   David Cowings
        Executive Editor              Executive Editor
        Antispam Engineering          Security Response



        Eric Park                     Mathew Maniyara                  Sagar Desai
        Editor                        Editor                           PR contact
        Antispam Engineering          Security Response                sagar_desai@symantec.com
Metrics Digest

Global Spam Categories




Spam URL TLD Distribution




Average Spam Message Size




Spam Attack Vectors
Metrics Digest


Spam Regions of Origin




Geo-Location of Phishing Lures




Geo-Location of Phishing Hosts
Metrics Digest

Phishing Tactic Distribution




Phishing Target Sectors
Still No Sympathy From Spammers

On February 27th, a strong earthquake with a magnitude of 8.8 occurred off the coast of Chile.
As Symantec noted in last month’s report with the Haiti earthquake, spammers continue to
leverage these tragic events for their benefit. The example below downloads malware when
the user clicks on the link to view the video.

To protect from such malware threats as well as
other types of scam and phishing attempts us-
ing these earthquakes as cover, Symantec sug-
gests that users:

   Avoid clicking on suspicious links in e-mail or
    instant messages as these may be links to
    spoofed, or fake, Web sites.
   Never fill out forms in messages that ask for
    personal or financial information or pass-
    words. A reputable charitable organization
    is unlikely to ask for your personal details
    via e-mail. When in doubt, contact the or-
    ganization in question via an independent,
    trusted mechanism, such as a verified tele-
    phone number, or a known Internet address
    that you type into a new browser window
    (do not click or cut and paste from a link in the message).


Affected by Recalls? Spammers Want to Know

There has been several recalls from multi-
ple automobile manufacturers recently.
Due to a very large number of vehicles in-
volved in this round of recalls, there has
been widespread interest in developments




                                                regarding this event. In these examples, spam-
                                                mers trick the user to give up personal informa-
                                                tion by pretending to be a legal industry repre-
                                                sentative.
Will the Trend Continue?

In the previous month’s report, Symantec highlighted a sharp decline in spam containing .cn
URLs. This was due to the China Internet Network Information Center (CNNIC)’s action to
tighten registration of .cn domains. Although spam messages containing .cn URL crept up a
little bit towards the end of February, the effect of CNNIC’s new policy is clearly shown in the
graph below.

However, Symantec researchers have noticed a strong inverse relationship between .cn
and .ru URLs as spam messages with .ru domains have increased dramatically. Spammers may
have just found themselves a refuge after getting pushed out by CNNIC.




Unlike last month when EMEA region recorded 7.9 percentage point increase month-over-
month, the geographical breakdown of origin of spam remained fairly flat in February.
International Spam & Phishing Roundup

Spammers delivered malware by luring
the user with pictures of the Rio Carnival.




                                              Chinese spammers sent product spam
                                              using the Chinese New Year holiday.




Russian spammers used the Defender
of the Fatherland Day, a holiday ob-
served in Russia, to send replica prod-
uct spam.
International Spam & Phishing Roundup

Symantec observed an attack on the Indian Income Tax Department. It is the season of tax
returns in India and phishers chose the right time to send these phishing messages. Most us-
ers are not aware of these attacks, which state that the customer is eligible for a tax refund.
The email contained a link to a phishing site of the Indian Income Tax Department. To obtain
the tax refund, customers were asked to enter their confidential information. The domain
name of the fraudulent site was hosted on U.S.-based servers.

This is a screenshot of one such phishing site:
Phishing the Brands of Online Auction Marketing Tools

Brands of online auction marketing tools were new phishing targets. These tools are software
applications that are intended to facilitate the sellers’ side of popular online auction websites.
With the help of these tools, online auctions are easier and save time. Phishing attacks target-
ing the brands of online auction and shopping websites are already common. For better suc-
cess rates, phishers are now try-
ing alternate means to obtain the
credentials of online auction cus-
tomers by attacking legitimate
brands providing auction-
marketing tools.

This is a phishing site that spoofs
the branding of a leading auction
marketing tools website:




February 2010: Spam Subject Line Analysis

In February 2010, the top ten subject lines were dominated by a mixture of online pharmacy
and replica product spam. Spammers continue to use misleading subject lines such as “News
on myspace” and “Important notice: Google Apps browser support” in their online pharmacy
spam messages.
Checklist: Protecting your business, your employees and your customers

Do
    Unsubscribe from legitimate mailings that you no longer want to receive. When signing up
     to receive mail, verify what additional items you are opting into at the same time. De-
     select items you do not want to receive.
    Be selective about the Web sites where you register your email address.
    Avoid publishing your email address on the Internet. Consider alternate options – for ex-
     ample, use a separate address when signing up for mailing lists, get multiple addresses for
     multiple purposes, or look into disposable address services.
    Using directions provided by your mail administrators report missed spam if you have an
     option to do so.
    Delete all spam.
    Avoid clicking on suspicious links in email or IM messages as these may be links to spoofed
     websites. We suggest typing web addresses directly in to the browser rather than relying
     upon links within your messages.
    Always be sure that your operating system is up-to-date with the latest updates, and em-
     ploy a comprehensive security suite. For details on Symantec’s offerings of protection visit
     http://www.symantec.com.
    Consider a reputable antispam solution to handle filtering across your entire organization
     such as Symantec Brightmail messaging security family of solutions.
    Keep up to date on recent spam trends by visiting the Symantec State of Spam site which is
     located here.

Do Not
 Open unknown email attachments. These attachments could infect your computer.
 Reply to spam. Typically the sender’s email address is forged, and replying may only result
   in more spam.
 Fill out forms in messages that ask for personal or financial information or passwords. A
   reputable company is unlikely to ask for your personal details via email. When in doubt,
   contact the company in question via an independent, trusted mechanism, such as a veri-
   fied telephone number, or a known Internet address that you type into a new browser
   window (do not click or cut and paste from a link in the message).
 Buy products or services from spam messages.
 Open spam messages.
 Forward any virus warnings that you receive through email. These are often hoaxes.




* Spam data is based on messages passing through Symantec Probe Network.
* Phishing data is aggregated from a combination of sources including strategic partners, customers and security solutions.

More Related Content

What's hot

Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threatsmahesh43211
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanElliott Lowe
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"dogallama
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideRoen Branham
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...Global Risk Forum GRFDavos
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?martin_lee1969
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011subramanian K
 
The Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your CompanyThe Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your CompanyOsterman Research, Inc.
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 

What's hot (20)

Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from Finjan
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a ride
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 
The Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your CompanyThe Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your Company
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 

Viewers also liked

Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Symantec Italia
 
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniSymantec Italia
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Italia
 
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerAgenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerSymantec Italia
 
Symantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Italia
 

Viewers also liked (6)

Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
 
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
 
Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
 
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerAgenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
 
Symantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequenti
 

Similar to Spam and Phishing Report - Marzo 2010

Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009Symantec Italia
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Symantec Italia
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsDavid McHale
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017malvvv
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats- Mark - Fullbright
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015Andrey Apuhtin
 
Cyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCTM360
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 

Similar to Spam and Phishing Report - Marzo 2010 (20)

Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Phishing
PhishingPhishing
Phishing
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen Accounts
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
Typo squatting
Typo squattingTypo squatting
Typo squatting
 
Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015
 
Cyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related Scams
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 

More from Symantec Italia

Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoSymantec Italia
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Italia
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiSymantec Italia
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Italia
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Symantec Italia
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Symantec Italia
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Italia
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSymantec Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...Symantec Italia
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Italia
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Italia
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Italia
 
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Italia
 
Symantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Italia
 
Proteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiProteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiSymantec Italia
 

More from Symantec Italia (18)

Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodotto
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business Server
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequenti
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIV
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequenti
 
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
 
Symantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows Servers
 
Proteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiProteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciuti
 
SMB Protection Guide
SMB Protection GuideSMB Protection Guide
SMB Protection Guide
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Spam and Phishing Report - Marzo 2010

  • 1. March 2010 Report #39 Scam and phishing messages in February accounted for 19 percent of all spam, which is 2 per- centage points lower than in January, but nevertheless an elevated level. Spammers continued to use the earthquake in Haiti, and the recent earthquake in Chile as another vector to utilize. They also used other current high-profile events, such as recent auto recalls, to deliver spam messages. Also taking a look at international threats, this reports highlights attacks specific to Brazil, China, Russia, and India. Symantec observed a 16 percent increase from the previous month in all phishing attacks. This was primarily due to an increase in the volume of unique URL and IP attacks. 13 percent of phishing URLs were generated using phishing toolkits, an increase of 9 percent from the previ- ous month. A 12 percent increase was observed in non-English phishing sites from the previous month. There was a significant increase in phishing sites in Italian and French languages. The increase in Italian language phishing was attributed to a rise in attacks on three Italian banks. Phishing on one Canadian financial institution and one French bank led to the rise in attacks in French. More than 98 Web hosting services were used, which accounted for 12 percent of all phishing attacks. The following trends are highlighted in the March 2010 report:  Still No Sympathy From Spammers  Affected by Recalls? Spammers Want to Know  Will the Trend Continue?  International Spam & Phishing Roundup  Phishing the Brands of Online Auction Marketing Tools  February 2010: Spam Subject Line Analysis Dylan Morss David Cowings Executive Editor Executive Editor Antispam Engineering Security Response Eric Park Mathew Maniyara Sagar Desai Editor Editor PR contact Antispam Engineering Security Response sagar_desai@symantec.com
  • 2. Metrics Digest Global Spam Categories Spam URL TLD Distribution Average Spam Message Size Spam Attack Vectors
  • 3. Metrics Digest Spam Regions of Origin Geo-Location of Phishing Lures Geo-Location of Phishing Hosts
  • 4. Metrics Digest Phishing Tactic Distribution Phishing Target Sectors
  • 5. Still No Sympathy From Spammers On February 27th, a strong earthquake with a magnitude of 8.8 occurred off the coast of Chile. As Symantec noted in last month’s report with the Haiti earthquake, spammers continue to leverage these tragic events for their benefit. The example below downloads malware when the user clicks on the link to view the video. To protect from such malware threats as well as other types of scam and phishing attempts us- ing these earthquakes as cover, Symantec sug- gests that users:  Avoid clicking on suspicious links in e-mail or instant messages as these may be links to spoofed, or fake, Web sites.  Never fill out forms in messages that ask for personal or financial information or pass- words. A reputable charitable organization is unlikely to ask for your personal details via e-mail. When in doubt, contact the or- ganization in question via an independent, trusted mechanism, such as a verified tele- phone number, or a known Internet address that you type into a new browser window (do not click or cut and paste from a link in the message). Affected by Recalls? Spammers Want to Know There has been several recalls from multi- ple automobile manufacturers recently. Due to a very large number of vehicles in- volved in this round of recalls, there has been widespread interest in developments regarding this event. In these examples, spam- mers trick the user to give up personal informa- tion by pretending to be a legal industry repre- sentative.
  • 6. Will the Trend Continue? In the previous month’s report, Symantec highlighted a sharp decline in spam containing .cn URLs. This was due to the China Internet Network Information Center (CNNIC)’s action to tighten registration of .cn domains. Although spam messages containing .cn URL crept up a little bit towards the end of February, the effect of CNNIC’s new policy is clearly shown in the graph below. However, Symantec researchers have noticed a strong inverse relationship between .cn and .ru URLs as spam messages with .ru domains have increased dramatically. Spammers may have just found themselves a refuge after getting pushed out by CNNIC. Unlike last month when EMEA region recorded 7.9 percentage point increase month-over- month, the geographical breakdown of origin of spam remained fairly flat in February.
  • 7. International Spam & Phishing Roundup Spammers delivered malware by luring the user with pictures of the Rio Carnival. Chinese spammers sent product spam using the Chinese New Year holiday. Russian spammers used the Defender of the Fatherland Day, a holiday ob- served in Russia, to send replica prod- uct spam.
  • 8. International Spam & Phishing Roundup Symantec observed an attack on the Indian Income Tax Department. It is the season of tax returns in India and phishers chose the right time to send these phishing messages. Most us- ers are not aware of these attacks, which state that the customer is eligible for a tax refund. The email contained a link to a phishing site of the Indian Income Tax Department. To obtain the tax refund, customers were asked to enter their confidential information. The domain name of the fraudulent site was hosted on U.S.-based servers. This is a screenshot of one such phishing site:
  • 9. Phishing the Brands of Online Auction Marketing Tools Brands of online auction marketing tools were new phishing targets. These tools are software applications that are intended to facilitate the sellers’ side of popular online auction websites. With the help of these tools, online auctions are easier and save time. Phishing attacks target- ing the brands of online auction and shopping websites are already common. For better suc- cess rates, phishers are now try- ing alternate means to obtain the credentials of online auction cus- tomers by attacking legitimate brands providing auction- marketing tools. This is a phishing site that spoofs the branding of a leading auction marketing tools website: February 2010: Spam Subject Line Analysis In February 2010, the top ten subject lines were dominated by a mixture of online pharmacy and replica product spam. Spammers continue to use misleading subject lines such as “News on myspace” and “Important notice: Google Apps browser support” in their online pharmacy spam messages.
  • 10. Checklist: Protecting your business, your employees and your customers Do  Unsubscribe from legitimate mailings that you no longer want to receive. When signing up to receive mail, verify what additional items you are opting into at the same time. De- select items you do not want to receive.  Be selective about the Web sites where you register your email address.  Avoid publishing your email address on the Internet. Consider alternate options – for ex- ample, use a separate address when signing up for mailing lists, get multiple addresses for multiple purposes, or look into disposable address services.  Using directions provided by your mail administrators report missed spam if you have an option to do so.  Delete all spam.  Avoid clicking on suspicious links in email or IM messages as these may be links to spoofed websites. We suggest typing web addresses directly in to the browser rather than relying upon links within your messages.  Always be sure that your operating system is up-to-date with the latest updates, and em- ploy a comprehensive security suite. For details on Symantec’s offerings of protection visit http://www.symantec.com.  Consider a reputable antispam solution to handle filtering across your entire organization such as Symantec Brightmail messaging security family of solutions.  Keep up to date on recent spam trends by visiting the Symantec State of Spam site which is located here. Do Not  Open unknown email attachments. These attachments could infect your computer.  Reply to spam. Typically the sender’s email address is forged, and replying may only result in more spam.  Fill out forms in messages that ask for personal or financial information or passwords. A reputable company is unlikely to ask for your personal details via email. When in doubt, contact the company in question via an independent, trusted mechanism, such as a veri- fied telephone number, or a known Internet address that you type into a new browser window (do not click or cut and paste from a link in the message).  Buy products or services from spam messages.  Open spam messages.  Forward any virus warnings that you receive through email. These are often hoaxes. * Spam data is based on messages passing through Symantec Probe Network. * Phishing data is aggregated from a combination of sources including strategic partners, customers and security solutions.