Spam and ID theft attacked from all sides

Posted by   Virus Bulletin on   Jun 3, 2008

EU body issues warning, ICANN, Japan and Yahoo! take on spammers and phishers.

Last week a series of major institutions took action highlighting the threat of spam and phishing, with a serious warning released by European Union web security body ENISA and more concrete actions taken by web management body ICANN, the Japanese government and search engine giant Yahoo!.

ENISA (the European Network and Information Security Agency) presented a report estimating that spam cost Europe €27 billion in 2007, and that it represents a growing threat with the danger of a 'digital 9/11' on the horizon. The group called on the EU to improve efforts to combat the spam menace, including greater funding for anti-spam initiatives, a more unified approach to tackling spam, and the implementation of mandatory intrusion reporting systems. More details are at VNUnet here.

Meanwhile, the Internet Corporation for Assigned Names and Numbers (ICANN), the body responsibly for maintaining the structure of the Internet, has also been raising its efforts to reduce spam. Following the publication of a report suggesting that the vast majority of spamvertised sites are hosted at domains administered by a small number of registrars, the ICANN group responded by contacting the named bodies and threatening to revoke their licence to register domain names should they fail to take action to clean up their areas of the web. ICANN has a long-running system for registering complaints against specific domains, and claims to chase up over 75 issues per month with similar enforcement notices. ICANN's announcement is here, and the KnujOn organisation, which first drew attention to the clustering, is based here. More on the story can be found at GCN here.

Over in Japan, the government ratified a bill beefing up protection from overseas spam, which makes it illegal to send unsolicited email to addresses based in Japan. It is as yet unclear how, or even whether, the new law will be enforced, but the government apparently promised to seek assistance from foreign agencies to punish perpetrators, and has increased the maximum fine for spamming to 30 million yen ($290,000, €187,000). Coverage of the law's passing is in the Mainichi Daily News, here.

Finally, web behemoth Yahoo!, which recently implemented web search security advice from McAfee into its search results, announced that its is prosecuting an anonymous group of phishers who infringed copyright restrictions by using the Yahoo! name and styling in a spoof lottery email scam. The case is being brought against the unnamed group in the hope that it will grant Yahoo! legal powers to access ISP records to aid efforts to track the culprits down. More details can be found at Yahoo!'s own news pages here or in the UK Guardian here.

Posted on 03 June 2008 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.