Reports of spam and identity theft in the first quarter of 2019
Updated 18 July 2019
Period of four months
Traditionally, the exact phishing moment coincides with the day the hunter searched and focused on important confidential
information out there.
Astrologers who like bank card details So far, cybercriminal florists have used this device
In other places but most of the time, users give gifts to family members and buy medicines like Viagra. Tap / tap
Knowing the message resulted in sending victim information to cybercrcr hackers.
New APPLE product
At the end of March, Apple’s newest product was introduced, which usually works faster. In the application process
In the West, the number of attempts to buy legal website users to remove Apple services has increased dramatically. theft
Internet traffic via phishing emails seems to mislead polls and magazines
Log in with them on the real Apple ID page.
GET technical support
Customer support email is one of the most common types of web hosting. The number of such reports has increased dramatically
Slowly. Links to technical support sites (and also surprises) can be found in professional forums.
And social media
Everything we see in K1 has one thing in common:
They assist the company or business in the process
Promise by users and trained, qualified staff
Willing and willing to help. None of these, it’s free.
Users can’t solve their problems, but they can too
The use of LABAV
Last year, gun owners and owners on social media pages exchanged and edited pages.
Do this more by providing customer service rather than money-saving tools.
Governments as well as bills offer high rates of inconvenience and disruption to information exchange.
Cybercriminals use the skills to protect risk and protect products or services that appear expensive. I want to
In these categories, customers often search for all kinds of information, from name to bank size. It is not
All users must rely on digital.
TABLE OF CONTENTS
In K1, we have signed a few sermons as a self-propelled machine, showing that they work internally.
A display to confirm the title of the letter. Prosecutors tried to convince the defender to get rid of the stolen weapons that
were in the hands of the court
Most invoices are displayed or processed. In some cases, a specific function uses parameters of the same name
Sometimes secrets tell one to admit wrong.
In the first part, we saw a huge drop in mailings for the United States. The consumer. Electronic Payment Clinic (ACH).
Systems that move most customers and small businesses. This information contains invalid alerts.
For the level of communication of the ordinary citizen or company. These ads contain bad news.
(Upcoming articles, articles) and links to infected documents.
This is a risk
This section also has a great list: Send a message to the company owner
Wide range of applications available. Applicants are called to the registry for free employment by one click
Special software for embedded code. The user does this when trying to remove an application from the cloud service
The DDoS protection window opens, an alert appears and it links to the employee’s website.
Name of the most popular investment system used in vehicles. If the user is following, this is a bad DOC file
Trojan.MSOffice.SAgent.gen installs on a Trojan-Banker.Win32.Gozi.bqr distributed computer
This is human cancer.
There are examples
As long as he is destined, he loses all focus on online games. Cardholders continue to distribute their loans
The default user. In January 2019, we found a different way to send a letter to a criminal.
On behalf of the CIA chief, who claimed to have a technology and distribution system.
The foolish employee, whose name was changed from advertisement to advertisement, said he had received information about the
victim in the article.
(Social media / internet / forums etc.) This is considered part of the international community
Attempts to arrest more than 2,000 child abusers in 27 countries.
Victimart is known for securing $ 10,000 worth of merchandise in bitcoin.
Fear of finding specific data
As last year, scammers gained access using similar tactics
There are objections to personal data, pornography, etc., but this time
The CIA spokesman was there to make the message as credible and intimidating as possible
It is used as a bug.
Poor retail department
In the first quarter, Rennet’s business units faced a bad card. The content is presented in a real business letter,
Knowledge is provided by influential business partners.
At the same time, we do not receive any information about financial thefts from international companies.
Articles by American companies providing information services. Nothing more
All messages. Since there is no plain text, the victim should open the document with the attachment.
Trojan.MSOffice.Alien.gen and then Trojan-Banker.Win32.Trickter.gen are downloaded and installed on your computer.
Banks have consistently set this as the goal of e-fishing. Scammers try to trust as many fake messages as possible
Change the legal status of your email address, copy the official email Mail a copy, create valuable feedback,
For example, in the first quarter, fishermen will benefit from the highest legal victim status from the reports received.
In his body, he spoke the message of a terrorist attack on the Church of Christ. The striker wants to be replaced
The Bank of New Zealand, like sandals, has a reputation as a sender. In the email itself The letter says the bank has provided
New security features are required to use updated account information.
The computer used a magic website: New Zealand home page. All information is subject to:
The site will open for cybercrime when you press the Enter key.
In the first half of 2019, the highest spam was registered on March 56 – 56.33%. The average percentage of the total world
It was 0.95 ..97%, the same (00.07 pieces) as in 4/2018.
The highest share of Russian Internet traffic was in January (0.1 56.1 %%). The average price per quarter
.4 55..48% 0.01 more questions by morning.
The country’s spam source
The countries with the highest production were China (1.88.82%) and the United States (12.64%). One third of the Germans
In the first quarter, Brazil was 5%, in Russia the fifth (9.9 %%) and the fourth in Brazil (95.95 %%). From the inside
France (26,226%), Argentina (0.422%), Poland (3636%) and India (2.8%) are in the sixth place.
In the first quarter of 2019, the proportion of most spam messages (up to 2 KB) increased by 7.14 points compared to the fourth
quarter of 2018. At a level of 73.98. 25% stake
CB estimates fell to 8.27 (3.15 points). 1020 KB messages represent 5.11% of spam traffic, which corresponds to 1.08 pages. Fourth
The 2,050 KB reports reached 3.00 (0.32 points more in the fourth quarter of 2018).
In the first quarter of 2019, Exploit.MSOffice.CVE-2017-11882 was the most common malware for email transmissions with a ratio of
7.73. From inside
Backdoor.Van 32nd Adrum (7.62) was in second place and Cream.Van 32.WBVB (4.80) was in third place. He finished fourth in the
For Microsoft Office, Exploit.MSOffice.CVE-2018-0802 (2.81 round) has been rounded up, and Trojan-SpyWay 32. Neon (2.42) has been
Germany occupies the first place (11.88%) in terms of distribution of antivirus messages. check
Vietnam is in second place (.2.24 during) while Russia is in third place (5.7070%).
In the first quarter of 2019, the anti-phishing system blocked 111,832,308 attempts to send users to fake websites. Of all
Kaspersky Lab 12.11 applications.
It has been attacked by users around the world.
UNDER THE PRINCE
Since the first half of 1999, the country in which Brazilian consumers have the largest share of counterfeit consumers is 21.66%
Australia was eighth (17.20%). however, 4.46 p.p. the largest in Brazil. Spanish is gone
Compared to Portugal (16.86%) and Venezuela (16.72%), it supported the top 5, with only 1.96% (+ 0.87%).
Send to strangers
Anti-hail surveys in different sectors
Liaison with identity theft prevention laboratories
Episode. User solution
follow and click on your email address or social network
Who is the message or the origin of the party
provoking, the blog in the browser informs the user
there may be a threat.
At this point, the square part of the attack is on the remaining lines in front of the number of attacks.
Increased by 5.23. was 25.78% compared to the same quarter of last year.
It is represented on other sites in the world (19.82%) and is paid for
Lead a group based on financial institutions
Ethnic minorities (17.33%).
In the first half of 2019, the volume at the lower volume level increased by 0.06%. 55.97% were not stolen
At the time of the survey, more than 111,832,308 at 35,220,650 locations were recorded in the study area.
As always, hackers never lose the chance to get a good name
Golden logo for your purpose (sent by Apple, New Zealand)
Uhu). Tourists are not
This pirate costume definitely has a new outfit
The story of a salesman
Most importantly, it continues to use online designers to achieve their goals and develop advertising plans.
Use celebrities to improve your stream.
Source: RU Kaspersky [