Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Spam Down II: Grum Down

So the media is abuzz with news of the takedown of the Grum botnet, which has caused a big reduction in spam. Make no mistake this is welcome news indeed, and credit to Atif Mushtaq from FireEye for taking action. However, there are also some other things going on here which are impacting on spam output.

It's important to see this week's changes in light of the overall long term spam trend, which continues to go down, down, down. You can get a glimpse of the scale of the change by looking at our Spam Volume Index below. As I stated in a blog last week there are a number of reasons for this huge decline, including spam affiliate programs closing (Spamit.com), botnets disabled (Rustock), botnet operators apprehended (Mega-D), infighting between spamming rivals and other botnets going strangely quiet (Festi). The big drop in September/October 2010 was Spamit.com closing.

12458_eabcf633-97c8-4a49-b4d6-16819c5006fd

In the last two weeks we have seen spam output from Lethic drop to nothing, as well as Donbot going quiet. Lethic was formerly the largest spammer, so this is very significant. And on top of that, we have the Grum control server takedown this week, which has caused output from Grum to slow to a dribble. You can see this effect in the Spam by Spambot chart attached. (Note the spambot stats are driven off a sample, so the absolute numbers in themselves do not mean much, it is the trend and scale of change is important.)

So over the last month we have seen the total number of spam hitting our servers cut in half, which coincides with what others are seeing. The output from Grum that is hitting our servers has declined to a dribble, a mere 5% of what it previously was. This suggests that at least one control server is active somewhere.

11008_a3ea008a-3f84-4458-b033-4f470035b08e

The interesting thing is that output from Lethic and Donbot spam started declining prior to attempts to takedown Grum servers, and we still don't know why. Maybe they are all partying together in the Greek Islands.

Finally, while these drops in spam are very welcome, history has shown us that the botnet operators can recover, relocate their servers and build their bot armies again. It would not surprise me to see Grum, Lethic, and some of the others resurrect themselves again in short order.

Latest SpiderLabs Blogs

Zero Trust Essentials

This is Part 5 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here.

Read More

Why We Should Probably Stop Visually Verifying Checksums

Hello there! Thanks for stopping by. Let me get straight into it and start things off with what a checksum is to be inclusive of all audiences here, from Wikipedia [1]:

Read More

Agent Tesla's New Ride: The Rise of a Novel Loader

Malware loaders, critical for deploying malware, enable threat actors to deliver and execute malicious payloads, facilitating criminal activities like data theft and ransomware. Utilizing advanced...

Read More