{"id":89903,"date":"2017-08-22T08:00:14","date_gmt":"2017-08-22T12:00:14","guid":{"rendered":"https:\/\/techvibes.com\/?p=89903"},"modified":"2017-08-22T10:20:33","modified_gmt":"2017-08-22T14:20:33","slug":"sophisticated-spammers-behind-surge-in-online-attacks","status":"publish","type":"magazine","link":"https:\/\/brainstation.io\/magazine\/sophisticated-spammers-behind-surge-in-online-attacks","title":{"rendered":"Sophisticated Spammers Behind Surge in Online Attacks"},"content":{"rendered":"<p>Spam emails\u00a0are often redirected to a junk\u00a0mailbox where unwanted messages\u00a0can be deleted with a couple clicks. But when opened, these unsolicited emails can contain\u00a0malicious attachments and links\u00a0to phishing websites\u2014and a new study has found it&#8217;s only getting worse.<\/p>\n<p>In the past year, the number of spam emails sent surged by 400 per cent, according to the <a href=\"https:\/\/www-01.ibm.com\/marketing\/iwm\/dre\/signup?source=urx-13655&amp;S_PKG=ov57325&amp;ce=ISM0484&amp;ct=SWG&amp;cmp=IBMSocial&amp;cm=h&amp;cr=Security&amp;ccy=US&amp;&amp;cm_mc_uid=79796770841714890989951&amp;cm_mc_sid_50200000=1502458811&amp;cm_mc_sid_52640000=1502459087\" target=\"_blank\">latest research<\/a> by IBM&#8217;s X-Force Kassel. The Germany-based team runs one of the largest databases of honeypots and spam research.<\/p>\n<p>&#8220;Nowadays, malware is more sophisticated than ever, and its delivery methods are not falling short,&#8221;\u00a0wrote study co-author Limor Kessem\u00a0<a href=\"https:\/\/securityintelligence.com\/all-in-a-spammers-workweek-where-do-the-busiest-spammers-work-around-the-clock\/\" target=\"_blank\">in a blog post<\/a>. She&#8217;s an executive security advisor at IBM Security.<\/p>\n<p>Analyzing spam over a six-month period, the IBM research team found that nearly 44 per cent contained malicious attachments. More so, 85 per cent of those attachments are delivering ransomware, locking data and charging users to unlock or recover files.<\/p>\n<p>IBM X-Force Threat Intelligence Index\u00a0looked into the spammer&#8217;s workweek to better understand how they operate. Turns out, they&#8217;re like most people, operating a Monday to Friday schedule with\u00a0Tuesday being the most productive day for generating spam content.<\/p>\n<p>They discovered that nearly a third of spam originated from India, while South America wasn&#8217;t far behind at 25 per cent.\u00a0By comparison, only 7 per cent of all spam comes from Canada and the US.<\/p>\n<p>&#8220;Studying the trends that move illicit spamming and the mechanisms that enable cybercrime is an essential part of threat intelligence and situational awareness for any organization,&#8221; wrote Kessem.<\/p>\n<p>The research team also examined botnets capable of spreading internet spam at all hours. Often acting on behalf of\u00a0cybergangs, Kessem called Necurs\u2014a sophisticated botnet\u2014&#8221;a major threat.&#8221; One of its most recent ploys was delivering fake DocuSign attachments.<\/p>\n<p>&#8220;Botnets such as Necurs never sleep, and their zombie members can be programmed to spew out spam at any time of day,&#8221; Kessem said. &#8220;Botnet operators are constantly looking for new ways to circumvent spam filters and make it through to recipients\u2019 inboxes without being blocked or their malicious attachments being disabled.&#8221;<\/p>\n<p>Kessem explained that with\u00a0millions of malicious emails sent every day, businesses can help keep their organizations\u00a0safe from spammers and spambots by understanding their\u00a0methods.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spam emails\u00a0are often redirected to a junk\u00a0mailbox where unwanted messages\u00a0can be deleted with a couple clicks. But when opened, these unsolicited emails can contain\u00a0malicious attachments and links\u00a0to phishing websites\u2014and a new study has found it&#8217;s only getting worse. In the past year, the number of spam emails sent surged by 400 per cent, according to [&hellip;]<\/p>\n","protected":false},"author":76241,"featured_media":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[276,1084,1085,1086,1083],"magazine-region":[],"magazine-series":[],"magazine-topic":[],"class_list":["post-89903","magazine","type-magazine","status-publish","hentry","category-News","tag-ibm","tag-ibm-x-force-threat-intelligence-index","tag-spam","tag-spambots","tag-x-force-kassel"],"acf":[],"_links":{"self":[{"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/magazine\/89903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/magazine"}],"about":[{"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/types\/magazine"}],"author":[{"embeddable":true,"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/users\/76241"}],"version-history":[{"count":0,"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/magazine\/89903\/revisions"}],"wp:attachment":[{"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/media?parent=89903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/categories?post=89903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/tags?post=89903"},{"taxonomy":"magazine-region","embeddable":true,"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/magazine-region?post=89903"},{"taxonomy":"magazine-series","embeddable":true,"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/magazine-series?post=89903"},{"taxonomy":"magazine-topic","embeddable":true,"href":"https:\/\/brainstation.io\/wp\/api\/wp\/v2\/magazine-topic?post=89903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}