Spam and phishing mail

Spammers change their tune

Spammers have brought another instrument into their orchestra of tricks – MP3 audio files. This new type of spam is circulating in European mail traffic: a blank message, a classic social engineering message header, and an attached MP3 file. There’s been speculation that this might happen for a while, and although this new development is interesting, we don’t think that MP3 spam is going to have much of a future.

The actual audio file contains a ‘stock spam’ message designed to inflate the price of shares in a certain company. But the spammers have had to make a trade off between making the message as small as possible, and making a comprehensible recording. They’ve misjudged – the quality of the sound file isn’t easy to listen to. Even if a user does bother to listen to the almost 30 seconds of advertising, it’s unlikely that they’ll be persuaded to buy, as listening to a recording, noting the details and then going online is a far longer process than simply clicking on a link in an email.

However, this latest mass mailing demonstrates once again that spammers are still trying new tricks in their continued quest to slip advertising past spam filters and trick unwary users.

Spammers change their tune

Your email address will not be published. Required fields are marked *

 

Reports

Lyceum group reborn

According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the group’s activity, focused on two entities in Tunisia.

GhostEmperor: From ProxyLogon to kernel mode

While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the cluster GhostEmperor.

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

Subscribe to our weekly e-mails

The hottest research right in your inbox