New survey results from Sophos find the number of spam emails with dangerous attachments have soared. The report reveals the malicious messages rose eight-fold in just three months Cyber criminals are increasingly turning to spam as a means of infecting computers, according to a new report from IT security and control firm Sophos.The Boston-based firm found an eight-fold increase in the number of spam emails containing dangerous attachments that were sent to business organizations between July and September 2008. The Q3 Dirty Dozen spam report not only documents an alarming rise in the proportion of spam emails, but an increase in spam attacks using social engineering techniques to snare unsuspecting computer users, according to Sophos senior technology consultant Graham Cluley. The survey found that one in every 416 emails contained a dangerous attachment designed to infect the recipient’s computer. That number is up from only one in every 3,333 the previous quarter, said Cluley. Much of the increase is due to several large-scale malware attacks made by spammers during the period, he said. The worst single attack was the Agent-HNY Trojan horse, which was sent disguised as the Penguin Panic arcade game for Apple iPhones. Other major incidents included the EncPk-CZ Trojan, which pretended to be a Microsoft security patch, and the Invo-Zip malware, which masqueraded as a notice of a failed parcel delivery from firms such as UPS. “While many people may know better than to click on an attachment that says ‘sexy pictures’, these new tactics are more alluring,” said Cluley “Too many people are clicking without thinking — exposing themselves to hackers who are hell-bent on gaining access to confidential information and raiding bank accounts.” Spammers continue to embed malicious links and spam out creative and timely attacks designed to prey on users’ curiosity, said Cluley. In August, a wave of spam messages claimed to be breaking news alerts from MSNBC and CNN. Each email encouraged users to click on a link to read the news story, but instead took unsuspecting users to a malicious webpage which infected Windows PCs with the Mal/EncPk-DA Trojan horse. “When a spam email appears to come from a trusted source, too many users are fooled and end up clicking through to a malicious webpage,” said Cluley. Education continues to be key to preventing infection, said Cluley, who encouraged business organizations to give users initial and also refresher instruction on avoiding suspicious emails.“The advice is simple: you should never open unsolicited attachments, however tempting they may appear,” he said.The United States remained in the number one spot for relaying spam across the globe, generating 18.9 percent of the malicious emails. Russia has increased its contribution to the world spam problem, soaring from 4.4 percent last year, to 8.3 percent during this time period, according to the report. Turkey, China and Brazil were the other countries on the top-five spam relaying list. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe