Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Pump and dump spam waits for Hurricane Sandy

Even stock scammers needed to put their plans on hold following the closure of stock markets for 2 days. In the typically worded email shown below, recipients are encouraged to buy into low-priced shares now that Hurricane Sandy has passed and trading has resumed. Interestingly, we see less topical spam

Read More >

.com malware pretends to be naughty .com website

Sometimes the “other side” uses a neat trick that seems so obvious. In these cases we think “they must have done this before” – then we search the archives (Google) for proof that it has indeed been used before. A good example is our post from last year where we

Read More >

US Election used as malware smokescreen

At first glance this looked like a “standard” email-malware attack. As with many similar attacks the email pretends to be carrying an eticket attachment – this time from Delta. The zip file holds executable malware. In case we weren’t sure this is malware here are some of the giveaways: The

Read More >

Measuring the success of a malware campaign

We are often asked whether we have any way of knowing how successful a particular malware or spam campaign has been. We assume that the “other side” tracks this sort of thing to see what social engineering works, and which material escapes spam and malware checks. (If any spammer is

Read More >

Your friend has shared a Groupon malware coupon with you!

A recent collection of malware emails borrows heavily from authentic mailings sent out by Groupon and LinkedIn. The outbreak is different from the blended attacks that have featured regularly in the last few months since it relies on attached malware as opposed to a link to drive-by malware. Using email

Read More >

Beware the phony Classmates.com email

Classmates.com has become the latest in a series of well-known brands to be abused by a particular gang of malware distributors. The similarities to other outbreaks include:  Linking to multiple compromised sites which then redirect to the malware hosting sites Favoring WordPress sites (that can be exploited) Hosting the malware

Read More >