Express Computer
Home  »  News  »  Spammers using mobile apps to bait victims

Spammers using mobile apps to bait victims

0 50

In the first quarter of 2014, attackers started imitating messages from mobile applications, says a report by the Kaspersky Lab.

As per the report, the spammers especially like the popular mobile messengers WhatsApp, Viber and Google Hangouts: notifications purportedly sent from these applications were used to spread both malware and harmless adverts. The rising popularity of mobile devices means that phishing attacks targeting Apple IDs are becoming more frequent.

Many gadget owners are used both to synchronization of their contacts and to the fact that messages from mobile applications can arrive via email, so few would be suspicious of the fact that WhatsApp is not directly linked to an email service. This lack of caution could prove costly, since the attached archive contained the notorious Backdoor.Win32.Androm.bjkd, whose main function is to steal personal data from users.

“Recently we have seen a growth in the number of attacks targeting mobile users. Gadgets have become popular even among those who had little interaction with computers and are less familiar with computer security. This opens up new vectors of attacks for spammers and phishers. To protect themselves, users should remember not to open emails from unknown senders and especially not to click any links in these emails, which inevitably pose a risk to user security. Clicking unsafe links threatens user security regardless of which device is used – they pose a danger to desktop computers and mobile gadgets alike,” said Darya Gudkova, Head of Content Analysis & Research Department at Kaspersky Lab.

Where has the spam gone
The list of countries most frequently targeted by malicious emails has undergone some changes since the third quarter of last year. The US’s share (14%) grew 3.68 pp while the contribution of the UK (9.9%) and Germany (9.6%) decreased by 2.27 and 1.34 pp respectively. As a result, the US, which was third in the previous quarter, returned to the top of the rating in Q1 2014.

Sources of spam by country
The top three spam sources remained unchanged from the previous quarter: China (-0.34 pp), the US (+1.23 percentage points) and South Korea (-0.91 pp).

Phishing
The email and search portals category topped the rating of the phishers’ most popular targets (36.6% of all attacks).Second came social networking sites with 26% followed by financial and e-pay organizations and banks (14.7%)

Malicious attachments in email
The main goal of most malicious programs distributed via email is to steal confidential data. However, in Q1 malware capable of spreading spam and launching DDoS attacks was also popular. Most popular malicious programs are now multifunctional: they can steal data from the victim computer, make the computer part of a botnet, or download and install other malicious programs without the user’s knowledge.

The percentage of spam in email traffic
The percentage of spam in total email traffic during the first quarter of the year came to 66.34%, down 6.42 pp from the previous quarter. However, compared with the same period of Q1 2013, the share of spam in Q1 2014 barely changed, falling by only 0.16 pp.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image