Spammers hide from antivirus vendors

We are seeing a lot of SpamTools now. These programs are installed on victim machines secretly, where they proceed to harvest email addresses. The harvested addresses are sent to the SpamTool’s master and used for mass mailings. In most cases, such spammer utilties are then de-installed automatically.

In the beginning, SpamTools harvested all email addresses on the infected machine. Today, we are seeing more and more SpamTools, which are picking and choosing: they fignore addresses containg substrings that point to antivirus and antispam vendors.

The result? When antivirus and anti-spam vendors do not receive mass mailings directly, it takes longer for the security community to react. Spammers get an additional window of opportunity to reach more people.

By the way, many virus writers have used this tactic when writing email worms, which also often do not send infected emails to antivirus vendors in an attempt to stay undetected just a bit longer.

Spammers hide from antivirus vendors

Your email address will not be published.



Andariel deploys DTrack and Maui ransomware

Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly.

APT trends report Q2 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q2 2022.

Subscribe to our weekly e-mails

The hottest research right in your inbox