Video Screencast Help
Security Response
Showing posts tagged with Spam
Showing posts in English
Mayur Kulkarni | 23 Jul 2009 19:21:46 GMT

Over the last few months we have been keeping you informed about a rise in the category of image spam. This was mentioned in our April and June 2009 blogs on the topic, which specifically concentrated on how an old spamming method (image spam) is being reintroduced on a wider scale. Spammers have now shifted their focus from image spam attacks to obfuscated URL attacks—again, an old spamming technique. This type of obfuscation includes inserting white spaces and special symbols into the URL string to evade anti-spam filters. For image spam attacks, we have observed lines relating to intimacy in the subject header:

imagebrowser image

Later, we witnessed the same pattern again being used with the obfuscated URL attacks. We can...

Mayur Kulkarni | 22 Jul 2009 21:58:08 GMT

Mysterious stories about Michael Jackson still being alive have been developing on the Internet in the form of websites, discussion forums, as well as some news sites bringing in theories behind such stories. Even spammers do not wish to believe, or perhaps they don’t want to miss the prospect of tricking curious Internet users into opening their messages—particularly targeting those die-hard M.J. fans that would want him to live eternally.

Michael Jackson-related spam and malware campaigns were discussed in detail in our July ’09 State of Spam report. More than three weeks after M.J.’s death have passed and there are continuous spam and malware campaigns still being waged. Spammers still feel confident that they can get users to open messages using Michael Jackson’s death and, now, the “Michael Jackson’s still alive” news.


Gilou Tenebro | 20 Jul 2009 19:00:00 GMT

A few weeks ago, while most people were busy preparing for 4th of July celebrations and looking forward to a long weekend, W32.Waledac launched a new spam campaign. The links in the spam emails led to a website claiming to contain a fireworks video. We have previously seen this malware use popular holidays such as Christmas and Valentine’s Day, so it is not really surprising that it would use Independence Day as well. A screenshot of the 4th of July Waledac website is shown below:

imagebrowser image

Figure 1. Screenshot of W32.Waledac's 4th of July website

In this blog post I will give an overview of W32.Waledac and...

Sammy Chu | 15 Jul 2009 22:52:32 GMT

Fake e-card pickup notices are typically used to deliver malware; however, in the past several weeks Symantec has noticed a series of online pharmacy attacks employing the same strategy. To pick up an e-card, the recipient must click on a link in the message. These links take you to the e-card site and display your card. As with an e-card malware attack, the spammer has replaced this link with one of their cleverly crafted URL traps.

The observed messages appear as if they were sent from some of the more well known online greeting card service providers. However, unlike any legitimate e-card pickup notices, the link will redirect you to an online pharmacy site selling their wares at discount prices.

Here is what the message looks like in an inbox:

imagebrowser image

A legitimate e-card collection notice will usually provide the name or email address of the sender in the...

Mayur Kulkarni | 15 Jul 2009 22:34:22 GMT

Matrimonial (MM) sites provide a platform for people to search, match and interact with a prospective bride or groom. However, even this service has not been spared by spammers who use fraudulent means to cheat users.

We will be discussing how a simple proposal can turn into a trap and fool a prospective bridegroom into disclosing personal details. We know that most MM sites will permit the delivery of personalized messages only to premium members (paid customers). However, we observed that one of the sites provided this type of membership free of charge—possibly in consideration of the user also availing of its free email service. In all probability, the MM sites may also grant such discounts in order to grow their popularity graph. Obviously, with so much liberty granted, spammers will not wait for an invitation.

This process starts with the so-called “interest” shown in the user’s profile, with familiar dating language being used. The...

Hon Lau | 10 Jul 2009 18:16:24 GMT

Not content to let the Dozer and Koobface guys have all the fun, the Ackannta crew has unleashed another new variant on the unsuspecting masses. Today we saw in our spam traps a new variant of Ackannta that we have added detection for as W32.Ackannta.G@mm. Ackannta is a family of mass-mailing worm that also copies itself to removable drives. It has been noted to use well-known brand names and big news items (such as the recent Michael Jackson story) in email campaigns in the past in order to trick users into opening it.

At this time we are seeing this worm being sent out through emails in low numbers. The emails have the following characteristics:

 Jessica would like to be your friend on hi5!

 The email body is written in HTML and is a poorly made copy of the...

Dermot Harnett | 09 Jul 2009 17:08:22 GMT

In early June , Symantec reported that the FTC had worked with others to shut down the Internet service provider Pricewert LLC. While this was a good example of how security professionals can work together in the fight against cybercrime, spam volumes remained at a very high level throughout June, averaging 90 percent of all email messages. The recent passing of Michael Jackson and the subsequent public interest is yet another example of how spammers are willing to use any notable event as a cover to distribute their messages.

Click here to download the July 2009 State of Spam Report, which highlights the following trends:

  • Different Faces of Michael Jackson Spam and Malware
  • Fourth of July Holiday Brings Fireworks and More Spam Campaigns
  • Image Spam Update
  • Mass-Mailing Worm in Fake Twitter...
Eric Park | 08 Jul 2009 22:46:20 GMT

With the soaring popularity of social networking sites, it is no surprise that spammers try to take advantage of them. In the past, spammers would register their own accounts and then send unsolicited messages through the social networking site. By default, the site generated automated email to let the user know that there is a new message. While such notifications are technically legitimate, the user would have most likely considered the messages as spam, due to the unsolicited content. For spammers, this technique had a shortcoming—the message sent to the user was from an unknown person/entity.

Recently, Symantec has observed a rise in a newer technique of social networking site abuse. The below example is a legitimate notification from Facebook that informs the user of a new private message:

imagebrowser image

As noted above, the message itself is not spam because there really is a...

Eric Park | 08 Jul 2009 21:54:54 GMT

Spammers are always searching for ways to bypass anti-spam filters. While the “text with tables” technique is not new, it is worth noting because it demonstrates spammers’ creativity, as well as their utilization of existing techniques.

When spammers first used table HTML codes, it began as a simple table with various cells filled in with different colors to render what looked like regular text. This basic technique has since evolved into something more complex—spammers are using a table within a table.

In the example below, the spammer first defines an outer table (137 x 43). Then, each row of the outer table itself is defined as a table. These inner tables feature a unique cell length (defined by COLSPAN) and background colors.

imagebrowser image

Carefully crafted, the above HTML shows this when rendered:


Mayur Kulkarni | 07 Jul 2009 23:08:01 GMT

Spammers seem to believe that they don’t always need to invent new strategies to enter a user’s inbox—they know they can utilize existing tactics with better results. They are now re-using the tactic of attaching HTML files in their spam messages—this time in aid of the 419 spam category. This tactic began with simple phishing attacks, followed by a variation using URL encoding of HTML code, and was also observed in email-harvesting attacks. When we discussed this trend in earlier blogs, we noted that these types of attacks may not be restricted to phishing attacks alone. Actually, we are seeing these attacks extending to other malicious activities.

Presently we are observing 419 spammers making use of HTML attachments in the hopes of reaching a user’s inbox....