Spam and phishing

And the winner is…

It’s been a busy time in our spam lab. Sure, spam never goes away, but in May alone we’ve had spam linked to Mother’s Day

and spam linked to Victory Day, a major public holiday in Russia celebrating the end of World War II on 9th May. The message below is themed to fit the patriotic sentiments of the holiday, but the text at the bottom advertises printing services.

And now we’ve got a lot of Eurovision spam. Not surprising with the final looming. Tickets have been on sale on the Russian Internet since the middle of February, but this hasn’t stopped the spammers offering tickets which are one and a half, or sometimes twice, as expensive as tickets offered through official channels.

Of course, if you’re the one selling on a ticket, you’d be happy to get two or three times the face value. The problem is if you’re the buyer, and you pay over the odds for something that turns out to be a forgery.

There are lots of security features designed to distinguish genuine tickets from fakes, and funnily, some spammers are stressing this: the spam below (where the logo contains “noise” added by the spammers) ends the message by exhorting recipients to “Beware of fakes!”.

This is one of those rare cases when I, as a spam analyst, find myself agreeing with the spammers!

And the winner is…

Your email address will not be published. Required fields are marked *



Focus on DroxiDat/SystemBC

An unknown actor targeted an electric utility in southern Africa with Cobalt Strike beacons and DroxiDat, a new variant of the SystemBC payload. We speculate that this incident was in the initial stages of a ransomware attack.

APT trends report Q2 2023

This is our latest summary of the significant events and findings, focusing on activities that we observed during Q2 2023.

Meet the GoldenJackal APT group. Don’t expect any howls

GoldenJackal is an APT group, active since 2019, that usually targets government and diplomatic entities in the Middle East and South Asia. The main feature of this group is a specific toolset of .NET malware, JackalControl, JackalWorm, JackalSteal, JackalPerInfo and JackalScreenWatcher.

Subscribe to our weekly e-mails

The hottest research right in your inbox