MENU

SA’s virus infected e-mails rank 5th highest

August 29, 2011 • Security

Symantec Corp has announced the results of the August 2011 Symantec Intelligence Report, now combining the best research and analysis from the Symantec.cloud MessageLabs Intelligence Report and the Symantec State of Spam & Phishing Report.

Enrique Salem, Symantec President and CEO (Image source: ibtimes)

This month’s analysis reveals that once more spammers are seeking to benefit from fluctuations in the turbulent financial markets, most notably by sending large volumes of spam relating to certain “pink sheets” stocks in an attempt to “pump” the value of these stocks before “dumping” them at a profit.

In a pump-and-dump stock scam, spammers promote certain stocks in order to inflate the price as much as possible so that they may then be sold before their valuation crashes back to reality. The spam for these scams tries to convince the prospective mark that the penny stock is actually worth more than its valuation, or that it will soon skyrocket. Most of these claims are either misleading or false.

A successful pump-and-dump spam campaign will artificially drive up the price of the stock to a point where the scammers decide to sell their shares. This usually coincides with them ending the spam campaign, which in turn reduces the interest in the stock, helping to drive its valuation back to the original low price.

“Scammers can make substantial profits in a matter of days with a well-executed pump-and-dump spam. In the current turbulent environment many people may be convinced to invest in stocks that the scammers claim will benefit from the market turbulence,” said Paul Wood, Symantec cloud, Senior Intelligence Analyst.

Further analysis also revealed that there were as many new boot time malware (MBR) threats in the first seven months of 2011 as there were in the previous three years. An MBR is an area of the hard disk (usually the first sector) used by a computer to perform start up operations. It is one of the first things to be read and executed by the computer hardware when a computer is powered on, even before the operating system itself.

“MBR infections offer great scope for deep infection and control of computers, which makes the idea attractive to malware creators. Contemporary MBR infection methods are a fairly complex affair usually executed by highly skilled individuals,” said Wood.

Analysis also reveals that while global spam levels were lower in August compared to the previous month, phishing activity increased in August, with many increases coming from attacks related to major brand names such as those related to Apple’s iDisk service and a variety of Brazilian companies and services, including social networking and financial brand names.

Staff Writer

Comments

comments


Comments are closed.

« »