Click here to close now.


News Feed Item

Spam in January: Fake WhatsApp Notifications and Real Stars for Valentine's Day

ABINGDON, England, February 28, 2014 /PRNewswire/ --

Kaspersky Lab has today published the results of the company's spam monitoring for January 2014.

Top 3 stories in January:

  • Detection of emails claiming to be from the popular WhatsApp messenger for smartphones. The messages stated that an attached archive contained a photo from a "friend". The attachment actually contained a malicious program detected by Kaspersky Lab as Backdoor.Win32.Androm.bjkd - a notorious backdoor whose main functionality is to download other malware on the victim's computer and steal personal data.
  • Another popular theme in January was that of video surveillance systems to help secure private and commercial premises. This English-language spam focused on personal safety and the possibility of keeping an eye on husbands and wives, as well as health visitors and workmen in private homes.
  • In the run-up to Valentine's Day, English-language spam also included the traditional 'flower' partner mailings and suggestions for a romantic meal or trip, as well as adverts offering some very unusual gifts such as a real star in the sky.

In January, scammers also continued to send out 'Nigerian' letters exploiting the deaths of former Israeli prime minister, Ariel Sharon, and South Africa's ex-president, Nelson Mandela. One 'Nigerian' letter was supposedly written by the lawyer of the late president's second wife. It stated that his ex-wife and her lawyer needed help to obtain a huge amount of money, gold bars and assistance to invest it. They claimed they were searching for a respectable person who had to be a foreign citizen. Another similar letter claimed to come from Mandela's third wife Graca Marshal. The scammers tried to win the recipient's sympathy with a sad tale about the struggle for his millions within the Mandela family. The fraudsters asked for help in transferring money and keeping it safe in an account belonging to the recipient.

Tatyana Shcherbakova, Senior Spam Analyst at Kaspersky Lab, commented: "Trojan-Spy.html.Fraud.gen remained the most widespread malicious program. It belongs to a family of Trojan programs that use spoofing technology to imitate HTML pages, and are distributed via email in fake notifications from major commercial banks, software developers and e-stores. After opening one of these pages, users enter their login details, which is then passed on to cybercriminals who gain full access to the victims' confidential information."

Key statistics

  • The share of spam in global email traffic decreased by 7.6 percentage points and averaged 65.7 per cent in January. The drop in the proportion of spam was due to a traditional lull in activity at the beginning of the year.

Leader of the month - USA

  • The USA (+3.5 percentage points, 16 per cent) topped the rating of countries with the highest number of mail antivirus, pushing the UK down to second (-3.41 percentage points, 10 per cent). Germany remained third (-0.39 percentage points, 10 per cent).
  • The USA replaced China as the biggest source of spam (21.9 per cent). China's contribution (16 per cent) fell by 7 percentage points, leaving it in second place. South Korea was third once again (12.5 per cent).

The full report is available at

About Kaspersky Lab

Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions. The company is ranked among the world's top four vendors of security solutions for endpoint users*. Throughout its more than 16-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers. Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at

* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2012. The rating was published in the IDC report "Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares (IDC #242618, August 2013). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2012.

Follow us on Twitter

Like us on Facebook

Editorial contact:
Berkeley PR    
Lauren White      
[email protected]    
Telephone: +44(0)118-909-0909    
1650 Arlington Business Park    
RG7 4SA, Reading    

Kaspersky Lab UK
Ruth Knowles
[email protected]
Telephone: +44(0)7590-440-433
Milton Business Park
OX14 4RY, Oxford

SOURCE Kaspersky Lab

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...