Swine flu spam leveling off, but attacks continue

Share this article:
Filters are doing a better job at killing swine flu-related spam before it reaches inboxes, but that doesn't mean cybercriminals are giving up on leveraging the widely covered news story.

In the middle of the week, the amount of spam referencing the virus outbreak made up about four percent of all unwanted email, said Scott Olechowski, manager of Cisco's threat research team. However, those amounts fell Friday to roughly one percent.

"The feeling is that swine flu itself is such an easy thing for spam filters to catch," he told SCMagazineUS.com on Friday.

To keep their ploy going, some spammers have opted for targeting non-English speaking recipients, such as people living in Portugal and Japan, where they may not have controls yet in place to weed out swine flu spam, Olechowski said.

Up until recently, most of the swine spam was trying to get recipients to purchase pharmaceuticals, in some cases medications they claimed can help prevent infection, he said. But many of the current emails are trying to load malware onto users' computers by trying to get them to click on a link.

In most cases, victims are then delivered to a website that tries to persuade them to install a trojan disguised as a codec, Olechowski said. In some cases, though, users can be infected simply by visiting the malicious site if their systems are unpatched.

Security firm SonicWALL, meanwhile, said Friday that its researchers have detected a swine flu-related malware scam targeting Mexican banks.

Should the outbreak continue to make big news, spammers likely will customize their messages so they still are related to swine flu but do not actually use those specific words, Olechowski said.

Share this article:

Sign up to our newsletters

More in News

In Cisco probe, misuse or compromise spotted on all firms' networks

In Cisco probe, misuse or compromise spotted on ...

Cisco analyzed the business networks of 30 multinational companies last year, and revealed the findings in its 2014 Annual Security Report.

Fareit trojan observed spreading Necurs, Zbot and CryptoLocker

The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.

Post Heartbleed, tech giants join initiative to bolster open source

Post Heartbleed, tech giants join initiative to bolster ...

The newly formed Core Infrastructure Initiative, created to boost under-funded open source projects, will tackle OpenSSL first.