For the fourth year running programs designed to steal users logins, passwords and other confidential data remain on top of the list of the most widespread malware distributed by email, according to Kaspersky Lab.
The Internet security experts summarized spammer activity for 2014:
Spam mailings imitating emails sent from mobile devices are becoming very popular. We found emails like this in several languages. They iPad, iPhone, Samsung Galaxy and other models. These messages had one thing in common – very short (or non-existent) text and a signature reading “Sent from my iPhone”. Typically, they contain links to malicious attachments.
Generally spam mass mailings imitate notifications from different mobile applications such as WhatsApp and Viber. Users are familiar with the synchronization of cross-platform apps and the synchronization of contact data between apps and different notifications from them. As a result many mobile device owners don’t think twice about an email saying that something has arrived on their mobile messenger. But this is a mistake: these mobile applications are not connected to the user's email account, which proves that such emails are obviously fake.
“Fake bank notifications are among the most common types of malicious spam or phishing attacks. Recently, we have seen noticeable changes in the structure of some phishing email. In 2014, spammers began to complicate the design of fake messages by adding more links to official resources and services of the organizations from which they claim to be sending their bogus notifications. Obviously, the attackers hope that an email with a few legitimate links would be recognized as legitimate by users and spam filters alike. Meanwhile, the email contains a single fraudulent link that either redirects users to a phishing site or downloads a malicious archive”, said Maria Vergelis, Spam Analyst at Kaspersky Lab.
The Top 3 countries that produced the majority of spam mass mailings comprised the USA (16.7%), Russia (5.9%) and China (5.5%).
To learn more about spam in 2014, please read the blog post available at Securelist.com.
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.