tag
SPAM

No Stone Left Unturned

We have discussed SEO poisoning extensively in the ESET Threat Blog, and it should come as no surprise to our readers that any topic which trends up quickly in search engine traffic will be exploited by the criminals who specialize in such activities.  The poisoned search term du jour is "erin andrews death threat".  Apparently,

Shortened URLs: Don’t Sweat the Short Stuff?

A press query was passed to me concerning our blogs about the Russian bombings and the fact that criminals are making use of the topic to spread malware using blackhat SEO (Search Engine Optimization) and abuse of the twitter service. See "Russian Metro Bombings: here come the ghouls" and "Here come (more of) the ghouls" for more

Corpus Christi Hoax Mail

Bill B. forwarded an interesting hoax mail to my "hoaxchecker" account (hoaxchecker [at] gmail [dot] com. The hoax isn't so interesting in itself, in that it's been around quite a while, as is described at the ever-dependable hoax resource snopes.com. But I do find interesting the fact that this particular variant includes some wrinkles that

iPad scammers target the unwary

The Apple iPad is the current gadget du jour amongst the digerati and has been seeing strong presales, with estimates as high as 150,000 units on the first day.  With such attention in the media and the blogosphere, it is no wonder that both legitimate businesses and scammers have taken to using it as bait

The Return of Jacques Tits

It has been a year since we last discussed fraudulent domain name registrar scams and we wanted to let people know that this scam continues unabated. In a nutshell, a message is sent to a publicly-visible email address listed on your website (sales, support, the CEO's office, a public relations contact, et cetera) from a

Attack Vector Recycling?

I received a fax today. Now, that may not be worthy of noting on here, apart from the fact that I hardly ever receive faxes these days. But the interesting fact is that it was sent to my US based fax number and offered me a great deal on a "New Health Plan" for only

Ten Ways to Dodge Cyber-Bullets (Part 5)

[Part 5 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This series will also be available shortly as a white paper.] Trust People, Not Addresses Don’t trust unsolicited files or embedded links, even from friends. It’s easy to spoof email addresses, for instance,

Ten Years A-Spamming

Well, I'm pretty sure I've been seeing spam for a bit more than ten years, as has CAUCE (Coalition Against Unsolicited Commercial Email) in its various incarnations. However, the blog by Neil Schwartzman that was put up yesterday at http://www.cauce.org/archives/155-This-Decade-in-Spam.html#extended covered only the notable events of the last decade. Which was indeed eventful enough. In fact, it turns

Spam y Drive-by-Download, la combinación perfecta

En los últimos días hemos detectado una serie de mensajes de spam que asombran por su sencillez: un pequeño texto y un enlace. Si el usuario accede al enlace, no observará únicamente una publicidad, sino que el código del sitio web posee un script malicioso que direcciona en segundo plano a otro dominio que posee

Entrevista sobre el spam

Sin lugar a dudas, el correo electrónico no deseado, habitualmente llamado spam, constituye uno de los principales canales de propagación de una importante cantidad de códigos maliciosos que buscan comprometer, de alguna manera, la seguridad de los usuarios. Por otro lado, tanto a nivel hogareño como a nivel corporativo, representan una molestia cada vez más

Whatever Happened to the Unlikely Lads? – Conference Paper

Here's another conference paper we've put up recently on the white papers page at http://www.eset.com/download/whitepapers.php. "Whatever Happened to the Unlikely Lads? A Hoaxing Metamorphosis" by David Harley and Randy Abrams, was presented at the 19th Virus Bulletin Conference in Geneva in 2009, The paper was first published in Virus Bulletin 2009 Conference Proceedings. Copyright is

Is There A Lawyer In The Lab?

Now that the end-of-year security conference season is winding down, we're able to start making available some of the presentations and papers that we've been building up in the past few months, but haven't been able to make publicly available ahead of the events for which they were written. We've already made available a slide

The Truth About Cybercrime

I was quoted last month in an article at PC Retail (http://www.pcr-online.biz/features/305/The-truth-about-cyber-crime), which is nice. However, I just came across the notes I made at the time of the original enquiry/interview, most of which wasn’t used, so here are my full responses to the questions Andrew Wooden asked, in case they’re of interest. (Actually, they’re slightly expanded and I’ve

Yahoo! Group Spam Handling

So, in case you were wondering about the progress of my abuse report to Yahoo!, I did indeed get a response within 48 hours, thanking me for my communication, assuring me that they’d investigate, and informing me that they wouldn’t be letting me know about the outcome of that investigation, as they don’t disclose information about

Yahoo Group Spam

There’s nothing particularly new about Yahoo! group spam (no, wait, don’t go yet!) and I haven’t wasted much time on it so far, as what I’ve seen is pretty crude But I’ve been noticing an increasing number of emails to one of my most visible accounts welcoming me to groups with random names: stuff like

Spam a través de Skype

En los últimos días, nuestro Laboratorio de Investigación ha detectado una nueva modalidad de spam utilizando como infraestructura el conocido y popular programa de mensajería y videoconferencias Skype, que bautizaremos como skypam. La modalidad consiste en lo siguiente: los usuarios que hacen uso de Skype reciben un mensaje que contiene un enlace que hace referencia

Research and the Art of the Obvious

We know that spam works: well, it works well enough for spammers to keep devoting time and money into pumping sewage into the arteries of the internet. The interesting question is why does it work? The Messaging Anti-Abuse Working Group (MAAWG), a global coalition of network operators and messaging providers who do some vital work

Un correo, un fotomontaje y un malware

En los últimos días hemos observado una “nueva” modalidad de propagar malware a través de supuestas imágenes que nos envían para verificar si formamos parte de un fotomontaje. Los correos, en portugués, tienen la siguiente apariencia: A través de esta técnica de Ingeniería Social, se nos pregunta si alguien a modificado una foto nuestra. Para

Guest Blog: How Much Spam Does Waledac Send?

Sebastián Bortnik, at ESET Latin America, kindly translated a blog they put up today here and allowed us to reproduce it for our blog. I think you’ll find it interesting. Thanks, Sebastián! The revival of the spread of the Waledac trojan is already a fact. As the ESET team announced on Thursday, on Friday spam emails

Waledac, VirusTotal and some AV fallacies

[Since the owner of the blog described below interpreted this blog as a personal attack and marketing BS, I've removed information that identifies his blog. Which is a pity, because his blogs on the topic actually include useful information. I'm not withdrawing the whole blog, because it isn't marketing and it isn't about our product:

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
07 Apr 2010
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.