Category: Blog

The map of love leads to trouble

In mid-August we covered a huge email-malware outbreak that mostly included UPS-themed emails. The same malware continues to be distributed as Fedex confirmations, but also as the “map of love”. The “map of love” attachments accompany emails promising “tourists” a map of interesting destinations worldwide.  Some variations of the text:

Facebook friends that you don’t need

Commtouch labs has picked up a wave of phony Facebook friend request emails. Strangely, these all feature random Middle-Eastern/Asian names (not linked to actual Facebook accounts). Note that these requests arrive via email – not Facebook. Following any of the links leads to a malware download reported to be a

Welcome to Android Malware

Android malware has been around for a while now, but it has been somewhat uncertain how prevalent infected devices are. The Wildlist has been used as a measure to show which viruses are prevalent. What is interesting about the first Extended Wildlist in August 2011 is the inclusion of three

Changes in the Wilderness

The Wildlist is a list of viruses that is maintained by the Wildlist Organization. The intent is to have a list of viruses that is representative of what is really out in the Wild (Antivirus vendors’ name for what our customers will face). The list of viruses is provided by

Spam FAIL: Didn’t you learn to check your work at Spammer U.?

The spam sample below from Commtouch Labs shows an unfortunate lost opportunity for the spammer – a message that might have reached its recipient and enticed him/her to click on the enclosed link.  But the link leads to a parked domain, and based on its use of “Company ABC” and

What is antivirus software, Part 3?

I seem to be asking this question a lot. I have already written one article and one previous blog entry on this subject. It is an important question: Millions of people are using antivirus and probably every piece of data on this planet has been processed at least once through

Email malware levels skyrocket

Earlier this week we described a huge malware outbreak with increases of over 500%. The graph we presented showed a tapering off after the peak of the attack. The similar attacks in March and April also showed this trend – with a large initial outbreak followed by gradually decreasing spikes

“exe” read backwards spells “malware”

RIGHT TO LEFT OVERRIDE (RLO) is a unicode control character (U+202E) that reverses the character reading order from the traditional left-to-right, to right-to-left. This is mainly used for right-to-left languages (such as Arabic or Hebrew). We reported this trick last year but it has resurfaced extensively in the past week

A wild malware rollercoaster – over 500% increase

The UPS name is once again being used to spread vast amounts of email-attached malware. The last week has seen an extraordinary increase – over 5.5 times the average level before the outbreak. The attack closely resembles the large outbreak reported on at the end of March. There are numerous

Dating spam moves with the times

“Dating spam” – that’s what we call it. I mean, on the surface that’s what these emails seem to be offering. Last year we described the return to ASCII-art spam that promoted dating sites.  Of course spammers and the products that they promote must move with the times. So, as