Snapshot of Global Traffic Abuse



Why Cloudmark?

Cloudmark is the most trusted leader in security — protecting traffic, data and infrastructure. We safeguard service providers, enterprises and consumers worldwide with immediate, predictive protection from ever-evolving network threats.

Cloudmark Security Platform for DNS

What’s lurking in your DNS environment?

Get a free traffic analysis and gain valuable insight into the state of your DNS security.

As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.

Sign Up for Analysis

Cloudmark's 2014 Annual Security Threat Report

It's been a hot year for DNS. In our 2014 Annual Security Report we take a look at various forms of DNS abuse including DNS amplification, tunneling, exfiltration, and a study of DNS resource exhaustion at a major ISP. In the email space, bootleg Viagra® spam is a staple. This year, Cloudmark commissioned a chemical analysis of various samples from these fake pharmacies to determine just how legitimate and possibly dangerous these pervasive ads might be. Mobile customers have had their own woes this year with the largest targeting of Apple iMessage by spammers seen to date and we completed similar investigative research into this campaign. Our report details an investigation into the origins and on-going legal battle against these spammers and their evolving campaigns.

Get more Trends and Insights

Cloudmark Webinars

  • Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.

  • This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.

See more Cloudmark webinars

Recent Blog Posts

  1. People Who Could Really Break The Internet

    Mar 5, 2015 by Andrew Conway

    Among the many security failures of the past few months there has been one notable success. The Internet proved that it was robust enough to withstand’s Break the Internet edition. It’s nice to know that while North Korea can take down Sony, and Lizard Squad can put major gaming sites out of business on […]

    Continue reading...

  2. Apple Pay Under Attack

    Mar 4, 2015 by Andrew Conway

    Cloudmark’s 2015 security predictions included, “As mobile payment systems become more mainstream, they will come under attack from cyber criminals”. It came as no surprise to us to see a report that Apple Pay is now a vector for credit card fraud. The scammers are not compromising existing Apple Pay accounts – so far nobody […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark Videos

Javascript must be enabled to view videos.
DNS Tunneling and Data Exfiltration

DNS Tunneling and Data Exfiltration

Explore how DNS tunneling can be used by cybercriminals to exfiltrate data from your network and how you can protect your network and your data from such attacks.

DNS Leads to DDoS

DNS Leads to DDoS

Cloudmark CTO Neil Cook explains how DNS networks can be a gateway for DDoS attacks.

See more videos

Cloudmark Events

  • RSA Conference

    RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies.

    Monday, April 20, 2015 – Friday, April 24, 2015 San Francisco, California United States

See more Cloudmark events

Cloudmark News

  • CBS News

    Don’t Open These Fake IRS Emails

    February 12, 2015 by Amanda Schupak

    "Andrew Conway, a research analyst at security firm Cloudmark, told CBS News he has already begun seeing a flurry of phishing emails disguised as requests from the IRS."

  • Infosecurity Magazine

    Lizard Squad Back to Old Ways With Xbox Attack

    February 17, 2015 by Phil Muncaster

    "Hackers claiming to hail from the notorious Lizard Squad group have been gloating online after appearing to take down Xbox Live again with a DDoS attack."

  • sc-magazine

    Huge Spam Campaign Drops Trojan on UK Bank Customers

    February 17, 2015 by Doug Drinkwater

    "A huge spam campaign has been installing the Dyreza banking Trojan on tens of thousands of UK computers, specifically targeting those with accounts at major banks."

See more Cloudmark news

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.