Report: Spamming Soared in 2006

A report on spam by e-mail security firm Commtouch Software dubs 2006 the “Year of the Zombies.” The study found that “zombies,” the name given computers remote-controlled by hackers, can number up to 8 million hosts globally on a given day. As a result, spam volume increased by 30 percent in 2006, according to the […]

Written By: Brian Prince
Dec 27, 2006
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A report on spam by e-mail security firm Commtouch Software dubs 2006 the “Year of the Zombies.”

The study found that “zombies,” the name given computers remote-controlled by hackers, can number up to 8 million hosts globally on a given day. As a result, spam volume increased by 30 percent in 2006, according to the report.

For advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internet’s Security IT Hub.

“Spam outbreaks got bigger, faster and smarter during 2006,” Amir Lev, president and chief technical officer for Commtouch, based in Netanya, Israel, said in a statement. “Innovative spammers quickly developed new techniques to bypass common anti-spam technologies and amassed huge zombie botnets. Outbreaks have become so fast, massive and sophisticated that most anti-spam solutions had great difficulty defending against them.”

Zombie activity, the report found, accounts for 85 percent of the spam circulating the Internet. Multiwave image-spam outbreaks brought spam bloat to 1.7 billion MB per day. eBay and PayPal remain top targets for fraud, their names being used in 50 percent of all phishing attempts, the report said.

Natalie Lambert, an analyst at Forrester Research, said she was unsurprised by the report’s findings regarding the prevalence of spam. She added that spamming typically spikes during the holiday when more e-mails are being sent out by businesses.

Read more here about the increase in spam during the holiday season.

The report also found that Internet spammers used globally distributed botnets made up of zombie computers in their attacks. Botnet armies with as many as 200,000 zombies sought out poorly protected computers with fast Internet connections, particularly home broadband users. Commtouch’s labs estimated that there are between 6 million and 8 million zombie IP addresses active on any given day. Compromised zombie machines come in and out of circulation constantly; approximately 500,000 new PCs are captured and added to zombie botnets each day. A typical botnet can send 160 million spam e-mails in just 2 hours.

After years of declining success at spam detection, traditional anti-spam methods such as content filtering, heuristics and IP blacklisting were finally overcome this year by sophisticated new spam techniques, Commtouch officials said. Spammers outmaneuvered basic IP blacklists by using heavily distributed botnets, and used images and randomization to help messages slip by conventional anti-spam solutions. According to the report, image spam accounted for 70 percent of the spam bandwidth bulge.

“People felt the flood of spam more intensively in 2006, since many anti-spam technologies have not been able to keep up with the spammers’ ever-growing bag of tricks,” Lev said. “As a result of seeing more spam in their inboxes, end users’ awareness of the spam problem is becoming increasingly acute, and they are demanding solutions that block the vast majority of spam with a minimum of false positives.”

Editor’s Note: This story was updated to include more information from the report.

Check out eWEEK.com’s Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraine’s eWEEK Security Watch blog.

Recommended for you...

Video: How to Build Game-Changing Channel Partnerships with Theresa Caragol, CEO of AchieveUnite

Channel partnerships expert Theresa Caragol shares proven strategies, AI insights, and co-selling best practices to help businesses build high-impact partner relationships. Channel partnerships expert Theresa Caragol shares proven strategies, AI insights, and co-selling best practices to help businesses build high-impact partner relationships.

Katie Bavoso
Aug 13, 2025
Video: How Scale Computing and Velasea Power 6,000+ Surveillance Cameras at Resorts World Las Vegas

Discover how Scale Computing and Velasea are transforming physical security with hyperconverged infrastructure powering 6,000+ cameras at Resorts World Las Vegas. Discover how Scale Computing and Velasea are transforming physical security with hyperconverged infrastructure powering 6,000+ cameras at Resorts World Las Vegas.

Katie Bavoso
Jul 25, 2025
Video: How Simply NUC and Scale Computing Are Powering the Edge with Future-Proofed Hardware

Discover how Simply NUC and Scale Computing are powering innovation at the edge with future-ready hardware and virtualization software. Discover how Simply NUC and Scale Computing are powering innovation at the edge with future-ready hardware and virtualization software.

Katie Bavoso
Jul 23, 2025
Video: Breaking Down the new ThinkEdge SE100 from Lenovo and Scale Computing

Discover how Lenovo and Scale Computing are partnering to deliver hyperconverged, AI-ready edge solutions that drive innovation across retail, manufacturing, education and more. Discover how Lenovo and Scale Computing are partnering to deliver hyperconverged, AI-ready edge solutions that drive innovation across retail, manufacturing, education and more.

Katie Bavoso
Jul 22, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.