China emerges as phishing super power

China rises ten places to top the phishing generator premier league but it could soon be outdone in the spam charts by India

China is emerging as the new super power for cyber-criminality, according to security companies.

Spam specialist Marshal claims the People's Republic has become the number one source of phishing email in the past week, rising ten places.

The sudden surge in phishing out of China has pushed levels to their highest since July, claims the company, a threefold increase over the average for the past six months.

China now accounts for 18 per cent of phishing email, followed by South Korea with around 17 per cent.

Barely a week ago phishing email accounted for less than half a per cent of spam, but the recent Asian surge has shown a dramatic rise to more than 2 per cent currently.

China phishing mail targets financial institutions, such as Fifth Third Bank, National Australia Bank and Bendigo Bank.

DDoS attacks are also increasingly being orchestrated out of China.

Keith Laslop, president of DDoS mitigation company Prolexic, described it as "like the Wild West."

He said that he had never seen so much activity as in recent weeks and that attacks were increasingly small but targeted. As well as hitting the likes of the gambling industry, he also described a small online shop selling Italian charm bracelets that was hit by a series of DDoS attacks in the days following the emergence of a rival in China.

The numbers alone paint a worrying picture.

Symantec's figures for the first half of 2006 showed that five of the ten cities housing the most bot-infected computers - which are commandeered to launch these attacks - are in China.

Beijing and Guangzhou are the top two, and on a country basis, China, with 20 per cent, has the most bot-infected computers in the world.

"China is a country of thriving business, and not just legal ones," said Alex Kurz, technical director for Europe Middle East and Africa (EMEA), for Marshal.

Featured Resources

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief

Download now

Five reasons to move to the cloud

Join the enterprises moving their workloads to the cloud

Download now

Architecting hybrid IT and edge for digital advantage

Why business leaders should consider a hybrid IT strategy

Download now

Six reasons to accelerate remote asset monitoring with AI

How to optimise resources, increase productivity, and grow profit margins with AI

Download now

Recommended

Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021

Most Popular

How to build a CMS with React and Google Sheets
content management system (CMS)

How to build a CMS with React and Google Sheets

24 Feb 2021
Npower shuts down app after hackers steal user data
hacking

Npower shuts down app after hackers steal user data

25 Feb 2021
New monitors for an agile new normal
Sponsored

New monitors for an agile new normal

19 Feb 2021