Are You Sure You’re NOT Infected with Malware?
Don’t Fall Victim to Malware or Ransomware Attacks!
Detect and remove malware, viruses, ransomware & other threats for FREE! Get Protected with SpyHunter.Download SpyHunter (FREE Trial!)*
First of all, we are not referencing the mystery meat jellied in a can, but rather unwanted electronic mail and messaging polluting the Internet. Spam is the electronic version of junk mail sent through the postal service and is one of many malicious strategies employed over the Internet by cybercriminals or unscrupulous advertisers.
Spam is distributed in bulk, so sent to the masses. Distributors of spam are known as spammers and their primary goal is to reach as many end-users as possible in hopes of carrying out one or more payloads. Payloads could be scams that sell fake programs or tools, phish for vital data, secretly download malware, or even as basic as unsolicited advertisements. The cost to distribute spam is minimal and is roughly a manner of obtaining email addresses or lists, whether through purchase or deceptively, i.e. theft. The bigger cost is borne by the owners of the broadband, which is maliciously violated, or recipients, who fall victim to scams. According to many trusted computer security sources, including SpamLaw.com, Spam 45% of all Email is Spam.
45% of all Email is Spam – Source: SpamLaw.com
While email spam ranks high on the list of well-used spam strategies, other online media may be infiltrated or violated. Let’s take a closer look at some of these delivery trucks:
Email Spam – Email spam is a reminiscence of junk mail delivered through the postal service. However, not every email spam communication is full of unwanted advertisements. Cybercriminals invest a lot of stolen money studying human behavior and learning better ways to cheat PC users out of money, gather vital data or drop malware onto vulnerable systems. Email spam can be cleverly shaped and can spoof legitimate businesses or persons, i.e. family or friends. Email spam may contain an infectious link or attachment and when clicked, can secretly download malicious programs or redirect victims to fictitious web pages and forms to deceptively gather vital data.
Instant Messaging – Spam delivered via messaging clients, such as Skype, Yahoo! Messenger, Google Talk, Windows Live, etc. Instant messaging channels are attractive because most clients are not blocked by firewalls.
Social Networking – Security experts have seen a spike in social networking spam campaigns, since these sites, i.e. Twitter or Facebook, are not only popular and widely used, but offer a lax and friendly environment. Spammers hack account owners to dupe trusting associates, i.e. friends or followers and may post an infectious link, attachment, or video that when click unleashes a nasty infection or malicious program.
Spamdexing is when cybercriminals alter HTML pages and use black hat SEO (search engine optimization) tricks to manipulate the ranking of their malicious websites, having them placed high on search engine lists.
In the past, spammers posted infectious links on sites such as YouTube, however, such practice of allowing links has been discontinued. Now spammers spoof sites like YouTube and mislead the victim by giving it a juicy or sensationalized name and description, i.e. Death of Lady Gaga or Live Suicide, etc. When the link is clicked, the payload is unleashed, i.e. malware dropped, rerouted to a malicious website or survey generating revenue for a cybercriminal, etc.
Spam may be delivered via zombie networks or using another malware form, i.e. a Trojan. Payloads might be a fake form used to collect vital data, or dropped malware that installs a backdoor giving a hacker remote access and control of the infected system. Often dropped malware is absent an interface, keeping the victim in the dark. Today’s malware is stealth and is able to disarm weaker antivirus programs and security measures in place as well as reconfigure the system as follows:
Cybercriminals may partake in email address harvesting to nourish their spam campaigns. Email address harvesting collects and sells email addresses compiled in databases. While most scams resulting from spam rely on user help, i.e. click, unfortunately, many PC users do not take the time to fully read agreements or verify the source of emails, links, or attachments. Therefore, take heed and implement safety procedures that protect your vital data and keep hackers out of your computer.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Detections: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
|1.||'Web Access for the 2022 Version' Email Scam|
|2.||'Authentication Failure' Email Scam|
|3.||'New Security Features' Scam|
|4.||'Messages are Pending Due to Storage Error' Email Scam|
|5.||'USPS - Your Package is Waiting for Delivery' Email Scam|
|6.||RingCentral Email Scam|
|7.||'Suspicious Malwares Detected' Email Scam|
|8.||'Webmail Account Maintenance' Email Scam|
|9.||'Webmail Account Upgrade' Email Scam|
|10.||'YouPorn' Email Scam|
|11.||'Mail Account Deactivation Notice' Email Scam|
|12.||'Storage Capacity' Scam|
|13.||'USPS - Shipment is Still Pending' Scam|
|14.||'Request To Delete Your Email' Scam|
|15.||'Your Outlook is Full' Phishing Scam|
|16.||'OVHCloud Suspension' Email Scam|
|17.||'Norton LifeLock' Scam|
|18.||'Closing of Email Address Notice' Email Scam|
|19.||'There is an overdue payment under your name. Please, settle your debts ASAP' Email Scam|
|20.||'Data Backup' Email Scam|
|21.||'Your Account Has Been Temporarily Disabled' Email Scam|
|22.||'M&T Bank' Email Scam|
|23.||'Dropbox Is Full' Email Scam|
|24.||'You visit illegal websites'|
|25.||'Booking Offer' Email Scam|
|26.||Password Verification Email Scam|
|27.||'Suspension Notice' Scam|
|28.||'Authentication Required' Emal Scam|
|29.||'New Webmail Version' Email Scam|
|30.||'Stalled Funds - United Bank Of Africa' Email Scam|
Last updated: 2023-09-30
|'$100 Amazon Gift Card' Email Scam|
|'1nCuB0' Email Scam|
|'2022 FIFA Lottery Award' Scam|
|'A Law Case Filed Against Your Company' Scam|
|'Abnormal Network Traffic on This Device' Pop-Up Scam|
|'Abode Wallet' Email Scam|
|'ACCOUNT SHUT-DOWN' Email Scam|
|'Account Termination Request' Scam|
|'Ads.financetrack(1).exe' POP-UP Scam|
|'American Express - Update Your Account Information' Email Scam|
|'American Express Security Team' Email Scam|
|'Annual Salary Adjustment' Scam|
|'Anthem Encrypted Message' Email Scam|
|'Apple Invoice' Scam|
|'Apple Pay Suspended' Scam|
|'Army of Ukraine Needs Your Support' Email Scam|
|'Authenticate Account' Email Scam|
|'Authentication Failure' Email Scam|
|'Authentication Required' Emal Scam|
|'Bitcoin Blackmail' Email|
|'Board Approved Payroll' Scam|
|'Booking Offer' Email Scam|
|'Capital One SECURITY MESSAGE' Email Scam|
|'Clop Ransomware.dll' POP-UP Scam|
|'Closing of Email Address Notice' Email Scam|