Spammers exploiting WikiLeaks name: Kaspersky

Security

by CBR Staff Writer| 03 February 2011

War against Mega-D Botnet in the forefront in December monthly report

Spammers across the world exploited the popularity of Wikileaks in December 2010, said the Kaspersky Lab's monthly spam report.

In December, spam analysts at Kaspersky Lab's registered numerous mass mailings urging users to forward WikiLeaks links.

Spammers used the WikiLeaks name in background noise texts to bypass spam filters, said the report from the antivirus company.

The most popular source for spam was India. It accounted for nearly 10% of the total volume of spam. While Russia was in second place, Italy, Vietnam and Brazil completed the top five.

However, the report said, the amount of spam from Western Europe dropped significantly. The UK accounted for 4.3%, France for 2.2% and Germany for 1.8%.

The countries in which most malware in mail traffic was detected were India, Russia and Vietnam.

The month also saw the legal war on botnets come to the forefront, said the study.

In the US criminal proceedings began with the case of Russian Oleg Nikolaenko, who is suspected to behind the Mega-D zombie network, also known as Ozdok.

Kaspersky Lab senior spam analyst Maria Namestnikova said the case of Nikolaenko shows yet again the need to introduce stricter anti-spam laws in Russia.

Namestnikova added, "Spam is usually dominated by the Christmas and New Year holiday theme in December, but in 2010 it had to share the limelight with WikiLeaks, which once again underlines just how serious the scandal surrounding the website was at the end of the year."

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.