Snapshot of Global Traffic Abuse

 

PreviousPlay/PauseNext

Why Cloudmark?

Cloudmark is the most trusted leader in security — protecting traffic, data and infrastructure. We safeguard service providers, enterprises and consumers worldwide with immediate, predictive protection from ever-evolving network threats.

Cloudmark Security Platform for DNS

What’s lurking in your DNS environment?

Get a free traffic analysis and gain valuable insight into the state of your DNS security.

As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.

Sign Up for Analysis

Cloudmark's 2014 Annual Security Threat Report

It's been a hot year for DNS. In our 2014 Annual Security Report we take a look at various forms of DNS abuse including DNS amplification, tunneling, exfiltration, and a study of DNS resource exhaustion at a major ISP. In the email space, bootleg Viagra® spam is a staple. This year, Cloudmark commissioned a chemical analysis of various samples from these fake pharmacies to determine just how legitimate and possibly dangerous these pervasive ads might be. Mobile customers have had their own woes this year with the largest targeting of Apple iMessage by spammers seen to date and we completed similar investigative research into this campaign. Our report details an investigation into the origins and on-going legal battle against these spammers and their evolving campaigns.

Get more Trends and Insights

Cloudmark Webinars

  • Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.

  • This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.

See more Cloudmark webinars

Recent Blog Posts

  1. Lenovo’s and Google’s Registrar Hit With Malicious Website Redirection

    Feb 26, 2015 by Tom Landesman

    While it appears like Lenovo has had another slap to the face, this time it isn’t their fault (well, sort of). Yesterday, its website, Lenovo.com, was maliciously redirected to a defaced site controlled by the well-known hacker group, Lizard Squad. Prior to this, Google’s Vietnamese site suffered a similar attack where users were redirected away […]

    Continue reading...

  2. Happy Goldfish Bowl

    Feb 25, 2015 by Andrew Conway

    This week we learned of the Superfish Adware preinstalled on Lenovo computers, which used a tool from Komodia.com to disable the security in SSL communications. It turns out that the use of Komodia’s package was more widespread than just Superfish, and there may be millions of computers out there vulnerable to attack by fake HTTPS […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark Videos

Javascript must be enabled to view videos.
DNS Tunneling and Data Exfiltration

DNS Tunneling and Data Exfiltration

Explore how DNS tunneling can be used by cybercriminals to exfiltrate data from your network and how you can protect your network and your data from such attacks.

DNS Leads to DDoS

DNS Leads to DDoS

Cloudmark CTO Neil Cook explains how DNS networks can be a gateway for DDoS attacks.

See more videos

Cloudmark Events

  • 2015 Competitive Carriers Global Expo

    CCA’s Global Expo brings together more carriers than any other trade show event and is the best venue for meeting and networking with the decision makers of carrier companies.  With a lively exhibit hall, numerous networking opportunities, and dynamic educational sessions, CCA’s Global Expo provides the ideal meeting place for stakeholders in the mobile industry to come together under one roof.

    Tuesday, March 24, 2015 – Friday, March 27, 2015 Atlanta, Georgia United States
  • RSA Conference

    RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies.

    Monday, April 20, 2015 – Friday, April 24, 2015 San Francisco, California United States

See more Cloudmark events

Cloudmark News

  • CBS News

    Don’t Open These Fake IRS Emails

    February 12, 2015 by Amanda Schupak

    "Andrew Conway, a research analyst at security firm Cloudmark, told CBS News he has already begun seeing a flurry of phishing emails disguised as requests from the IRS."

  • Infosecurity Magazine

    Lizard Squad Back to Old Ways With Xbox Attack

    December 17, 2015 by Phil Muncaster

    "Hackers claiming to hail from the notorious Lizard Squad group have been gloating online after appearing to take down Xbox Live again with a DDoS attack."

  • sc-magazine

    Huge Spam Campaign Drops Trojan on UK Bank Customers

    February 17, 2015 by Doug Drinkwater

    "A huge spam campaign has been installing the Dyreza banking Trojan on tens of thousands of UK computers, specifically targeting those with accounts at major banks."

See more Cloudmark news

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.