Spam and Phishing reports for the first quarter of 2019
Updated July 1, 2019
Best Quarter Pictures
Traditionally, identity theft has been done as a Love Dove Deco, which aims to steal valuable information from the outside world.
They use astrologers as bank cards. Cybercritical broadcasting has frustrated everyone from online filters to social media.
But consumers are often asked to give gifts to loved ones and buy drugs like Viagra. Swallow / punch
The user is registered with law enforcement authorities.
It’s easy for everyone
At the end of March, I watched Apple products, where fraudsters routinely reject posters. Manufacturing
At the same time, there has been considerable growth in efforts to redirect users to fraudulent sites to follow Apple’s services.
Malicious email and fake email are part of Apple’s efforts to persuade users to open and register this link.
Their notes point to the Apple ID login page.
Fake customer support emails are one of the most popular forms of online fraud. There are many such statements
Areas that can be linked to long-term sponsored advertising (and queries) can be found on various forums
Enjoy with others.
All the data we received in Q1 have the same details.
It helps to know this company or company
The goods are on the promise of a working worker
He was ready and waiting for help. Of course, it’s not free.
Users not only solve problems, but they have
That too is a lie.
A new Instagram tool
Last year, fishermen and other fishermen made a list and signed their Instagram accounts.
The practice is more focused on how disappointment does not limit all services by linking it to a given strategy.
Documents but submissions, as well as promotions from Kanggo Makers for shipping.
Online marketers use this strategy to lure victims, promising to provide better products or services. I’m waiting for her
A common feature of this system is that it gives users all the information, from the bank card list. That’s right
All user details are lost.
In the first part, we collected the baseline data for the main projects by directly enrolling.
A list of sentence types is included. These apostates force the debtor to hide the internet
Make sure your bank updates and updates your payment information. Sometimes the true name is used as the true services
In some cases, the website of the attacker becomes a fraudulent enemy.
Get online business
In the first quarter, we saw details of sending users (ACH) to a US mail carrier.
Events are about customers and small businesses. Access to information is accurate
Indicates the level of movement made by the buyer or the company. There is a difference between those words.
(Files, files) and a link to download the file with malware.
The definition of women
In this regard, we have moved on to steer clear of this industry: the show is about famous businesses.
Get a lot of customers. Owners are invited to sign up for rentals
It is a useful tool on their computer to access information. Users announce the application in the cloud
Create a newsletter and employer related material called DDoS Security (
Most reputable payroll companies pay a premium on fees. If the user is browsing, the DOC files are received negatively
Trojan.MSOffice.SAgent.gen downloads Trojan-Banker.Win32.Gozi.bqr to download into your computer.
People will miss it
The problem with CE software
In our opinion, the concept of cybernetic in cryptocurrency is not in doubt. Spammers continue to lend money to cryptocurrencies
By separating users. In the first quarter of 2019, we have a bird mail sent by cybercriminals
For instance, on CIA staff, they have access to information provided by technology and customer service agents.
Child pornography is widespread in childhood.
Intelligent witnesses, whose names differ from those sent elsewhere, say they have the details of the victim in the file.
(Can be separated from online chat / chat / chat with anyone). This is called the platform
Try to find more than 2,000 experts in 27 countries of the world. But the point is crucial
In fact, a player to be spotted during the week allegedly paid $ 10,000 for bitcoins.
People are afraid that personal data will be revealed
The scammers use the same tactics as last year and mention the way to them
personal information, the threat of pornography and more
which is the most interesting and frightening legacy of CIA personnel
used as an achievement.
In the first quarter, the largest group of Runet suffered a strong spam attack. This tool shows the actual correspondence
and it was seen that the report was made by a colleague who worked for the victim’s company.
We also note that there are poor negotiations on the dissemination of stolen financial information about multinational companies.
false communication on behalf of an American company that provides information about services. Fix it
everything in the report. The reason for the lack of documentation is that stakeholders are required to open existing packages
Trojan.MSOffice.Alien.gen, of which Trojan-Banker.Win32.Trickster.gen is downloaded and installed on your computer.
Banks are identified as the best targets for identity theft. Hypocrites try to make the lie as credible as possible
change your domain address to email address email, copy official email email settings, create potential issues,
and so on Fraud uses important events in the first trimester to convince victims of the validity of the report, e.g.
add phrases to the news of the terrorist attack on Christchurz. The attackers requested it along with their names
banks in New Zealand, because this message will be entrusted to the sender. He. The letter says the bank brought everything
New security features require you to update your account information.
The site link is linked to the New Zealand Bank login page. All information is included
The site is redirected to network breaches by clicking Add / Remove.
In the first quarter of 2019, the average spam announced in March was 56.33. Spam is unique to the global email market
With 55.97 With is a close comparison (+0.07 percentage points) for the fourth quarter of 2018.
First, the trade index was in January in the Internet sector in Russia (56.19). Was the average value for this quarter
55.48 which is 2.01 percentage points. Greater than a quarter.
I am a child performer with a disability
In the past, the biggest poverty-stricken countries were China (15.82%) and the United States (12.64%). 3 others – initial
It dropped to fifth place in the fourth quarter (5.86), with Russia finishing third (6.98%) and Brazil (6.95%).
France (26.) (26%) came in sixth, followed by Argentina (42. (42%), Poland (36. 2.58 by) and India (8.8%).
During the first quarter of 2019, the share of the smallest sperm (up to 2 KB) increased by 7.14 percentage points to 73.98% as
compared to the first quarter of 2018. One twenty five
KB News Bank fell 8.27% (3.15 points). News 1020 KB 5.11% unwanted traffic, an increase of 1.08% in the fourth quarter. Part
The 2050 KB increase in reports will be 3.00% (0.32 pages in the fourth quarter of 2018).
In the first quarter of 2019, Exploit.MSOffice.CVE-2017-11882 was the largest malware on email servers with 7.73%. Fifth
In third place are Backdoor.Win32.Androm (7.62%) and Worm.Win32.WBVB (4.80%). The fourth went to another job
Exploit.MSOffice.CVE-2018-0802 (2.81%) for Microsoft Office, 23rd (2.42%) for Trojan Spy
Countries largely focused on spelling
The first three countries returned to Germany due to the prevalence of viral infections (11.88%). We are following
Vietnam came second (6.24%) and Russia (5.70%) came second.
During the first quarter of 2019, 111,832,308 victim restriction programs attempt to redirect users to fraudulent sites. 12.12% of
all Kaspersky Labs
World workers were attacked.
Similar to the previous month, Brazil, the country with the most fraudulent attacks in the first quarter of 2019, 21.66%,
add 1.53 p.
Austria was second with eight (17.20%), adding 2.42 percentage points. but it is still 4.46 p.p. behind the first Brazilian place.
Spain Spain is picking up
its position improved to 16.96% (+ 0.87% points), better than Portugal (16.86%) and Venezuela (16.72%), supported in the 5th
Evaluate different types of spiritual attacks
an institute based on the results of the Kaspersky End Lab
pvok. Every time a user tries to open it, it becomes active
identity theft or clicking the link in an email or social network
the message is the result of malware. This is a collection
in action, a banner ad will be displayed in the browser to inform users individually
This month the banking sector is first in the number of credit institutions.
volume 5.23 p. compared to 25.78% in the fourth quarter of last year.
Second place went to regular internet portal (.8 19.82) and payment
Other clear systems within the organization
Third place (17.33%).
0.06 cv in the first quarter of 2019. 55.97% of email spam disrupts the system spontaneously
There were more than 111,880,308 fishing sites, an increase of 35,220,650 over the previous reporting period.
As before, hackers don’t forget to set a high profile
Media Event for You (Apple Product Delivery, New Zealand)
Terrorist attack). The abuse was not over, it happened
More credible strategies like this have created new ranges for cybercriminals
History of the Messiah.
In addition, attackers continue to use social media to achieve their goals and launch an advertising campaign.
Use it to increase celebrity access.
Source: Kaspersky HR Room [