Etl2020 - Spam A4
Etl2020 - Spam A4
Spam
ENISA Threat Landscape
Overview
The first spam message was sent in 1978 by a marketing manager to 393
people via ARPANET. It was an advertising campaign for a new product
from the company he worked for, the Digital Equipment Corporation. For
those first 393 spammed people it was as annoying as it would be today,
regardless of the novelty of the idea.1 Receiving spam is an
inconvenience, but it may also create an opportunity for a malicious
actor to steal personal information or install malware. Spam consists of
2
2
__Findings
85%_of all e-mails exchanged in April 2019 were
spam, a 15-month high 1
3
Kill chain
Spam
4
Command & Actions on
Installation Control Objectives
MORE INFORMATION
5
Description
6
_Spam SMS
This year a SMS spam operation was carried out exposing more than 80
million users’ personal data. A large number of phone numbers received
messages containing certain phrases such as ‘free money’ or ’for real’ and
links to fake sites. From that point onwards, anyone that followed the link
would be called on to sign up, giving away sensitive information. It was
proved that the database used by the spammers was owned by the
ApexSMScompany, the legitimacy of which is still unknown. Although
security researchers accessed the database and tried to retrieve as much
information as possible fearing that the operation would stop
unexpectedly, it is still not known who and for what reason may access
and use this data as it is still available.
4
even Google Forms was manipulated to retrieve user data and send
commercial spam. A more aggressive case was the spam attack targeting
company accounts, requesting that money be transferred to the attacker.
To convince the victim, the spammers claimed to be able to send abusive
messages in the victim’s e-mail to more than 9 million e-mail addresses,
blacklisting the company’s e-mail address.
3
7
Description
_ Chameleon spam
Various campaigns in 2019 used the same botnet system to distribute
spam messages, although they used random headers and templates to
format the content. For that reason, security researchers started studying
these campaigns as one group under the alias ‘Chameleon spam’.
5
The Necurs spam botnet was very active during this period after a long
time of little activity. The Gamut botnet was the third most active spam
botnet in 2019. Gamut messages are mostly related to suggestions for
dating or meeting people, offers of pharmaceutical products and job
opportunities.
1
8
_Number of botnets C2s associated with
malware families
Others 4,331
Adwind/Jbfrost 282
RemocsRAT 501
Emotet 529
Gozi 728
TrickBot 734
Pony 739
NanoCore 1,159
AZORult 2,650
Lokibot 4,075
14
Source: Spamhaus
9
Description
COVID-19 attacks per day were recorded, but by March 2020 more than
2.500 attacks were taking place every day, promising a hard year spam-
wise.
12
Spam email
65.7%
BEC
Malware
26.8%
Trojan
11
Threats leveraging from COVID-19 . Source: Trend Micro
10
_ Examples
France 3.49%
Germany 3.55%
Brasil 5.25%
Russia 5.48%
USA 13.09%
China 19.72%
11
Mitigation
_Proposed actions
Implement content filtering to locate unwanted attachments, mails
with malicious content, spam and unwanted network traffic.
Regular update the hardware, firmware, operating system and any
drivers or software.
Use multi-factor authentication to access e-mail accounts.
Avoid money transfers to unverified bank accounts.
Avoid logging into new links received in e-mails or SMS messages.
Develop standard operating procedures and policies for handling
sensitive data.
Use a secure e-mail gateway with, if possible, regular and automated
maintenance of filters (anti-spam, anti-malware, policy-based filtering).
Disable automatic code execution, macro enabling and preloading of
graphics and mailed links.
Implement security techniques such as the sender policy framework
(SPF), domain-based message authentication, reporting &
conformance (DMARC), and the domain keys identified mail (DKIM).
Regularly update whitelists, reputation filters and the real-time
blackholeList (RBS).
Use AI and machine learning for anomaly detection checks.
12
“Phishing campaigns
can use spam tactics to
distribute messages
while spam can link the
user to a compromised
website to install
malware to steal
personal data.”
in ETL 2020
13
References
1. “Email: Click with Caution - How to protect against phishing, fraud, and other scams” June,
2019. Cisco. https://www.cisco.com/c/dam/en/us/products/collateral/security/email-
security/email-threat-report.pdf
2. “Spam and phishing in Q3 2019” November 26, 2019. Kaspersky. https://securelist.com/spam-
report-q3-2019/95177/
3. “Spam and phishing in Q2 2019” August 28, 2019. Kaspersky. https://securelist.com/spam-and-
phishing-in-q2-2019/92379/
4. “SMS Spammers Doxxed” May 9, 2019. Tech Crunch. https://techcrunch.com/2019/05/09/sms-
spammers-doxxed/
5. “Tracking the Chameleon Spam Campaign” September 25, 2019. Trustwave.
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tracking-the-chameleon-
spam-campaign/
6. “5 Biggest Cyberattacks of 2019 (So Far) and Lessons Learned” June 7, 2019. Gordon Flesch.
https://www.gflesch.com/blog/biggest-cyberattacks-2019
7. “The world worst spammers”. 2019. Spamhaus.
https://www.spamhaus.org/statistics/spammers/
8. “Naming the coronavirus disease (COVID-19) and the virus that causes it”. 2020. WHO.
https://www.who.int/emergencies/diseases/novel-coronavirus-2019/technical-guidance/naming-
the-coronavirus-disease-(covid-2019)-and-the-virus-that-causes-it
9. “WHO Director-General's opening remarks at the media briefing on 2019 novel coronavirus”
February 6, 2020. WHO. https://www.who.int/dg/speeches/detail/who-director-general-s-
opening-remarks-at-the-media-briefing-on-2019-novel-coronavirus/
10. “COVID-19 situation update worldwide, as of 11 June 2020” 2020. ECDC.
https://www.ecdc.europa.eu/en/geographical-distribution-2019-ncov-cases
11. “Developing Story: COVID-19 Used in Malicious Campaigns” April 24, 2020. Trend Micro.
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-
used-in-spam-malware-file-names-and-malicious-domains
12. “2019 Novel Coronavirus and COVID-19 Themed Attacks Dominate Threat Landscape” April 6,
2020. HIPAA Journal. https://www.hipaajournal.com/2019-novel-coronavirus-and-covid-19-
themed-attacks-dominate-threat-landscape/
13. “Emotet is back: botnet springs back to life with new spam campaign” September 16, 2019.
Malwarebytes Lab. https://blog.malwarebytes.com/botnets/2019/09/emotet-is-back-botnet-
springs-back-to-life-with-new-spam-campaign/
14. “Spamhaus Botnet Threat Report 2019” January 28, 2020. Spamhaus.
https://www.spamhaus.org/news/article/793/spamhaus-botnet-threat-report-2019
15. “Evasive Threats, Pervasive Effects” August 27, 2019. Trend Micro.
https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-
reports/roundup/evasive-threats-pervasive-effects
16. “Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study” February 28, 2019. Cisco.
https://blogs.cisco.com/security/anticipating-the-unknowns-2019-cisco-ciso-benchmark-study
17. “Internet Security Threat Report” Volume 24, Feburary 2019. Broadcom.
https://docs.broadcom.com/doc/istr-24-2019-en
18. “Spam and phishing in Q1 2019” May 5, 2019. Kaspersky. https://securelist.com/spam-and-
phishing-in-q1-2019/90795/
19. “Total Global Email & Spam Volume for May 2020” May, 2019. Talos.
https://talosintelligence.com/reputation_center/email_rep#global-volume
20. “Q3 2019: Email Fraud and Identity Deception Trends” June, 2019. Agari.
https://www.agari.com/insights/ebooks/2019-q3-report/
14
21. “The World's Most Abused TLDs” Spamhaus. https://www.spamhaus.org/statistics/tlds/
22. “Trend Micro Cloud App Security Report 2019” March 10, 2019. Trend Micro.
https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-
reports/roundup/trend-micro-cloud-app-security-report-2019
23. “The Sprawling Reach of Complex Threats”. 2019. Trend Micro Research.
https://documents.trendmicro.com/assets/rpt/rpt-the-sprawling-reach-of-complex-threats.pdf
24. “SONIC WALL Security Center Metrics”. SONIC WALL.
https://securitycenter.sonicwall.com/m/page/capture-labs-threat-metrics
15
Related
16
ENISA Threat Landscape Report
Sectoral and thematic threat
analysis
Contextualised threat analysis between
January 2019 and April 2020.
READ THE REPORT
17
About
_ The agency
The European Union Agency for Cybersecurity, ENISA, is the Union’s
agency dedicated to achieving a high common level of cybersecurity
across Europe. Established in 2004 and strengthened by the EU
Cybersecurity Act, the European Union Agency for Cybersecurity
contributes to EU cyber policy, enhances the trustworthiness of ICT
products, services and processes with cybersecurity certification schemes,
cooperates with Member States and EU bodies, and helps Europe prepare
for the cyber challenges of tomorrow. Through knowledge sharing,
capacity building and awareness raising, the Agency works together with
its key stakeholders to strengthen trust in the connected economy, to
boost resilience of the Union’s infrastructure, and, ultimately, to keep
Europe’s society and citizens digitally secure. More information about
ENISA and its work can be found at www.enisa.europa.eu.
Contributors
Christos Douligeris, Omid Raghimi, Marco Barros Lourenço (ENISA), Louis
Marinos (ENISA) and all members of the ENISA CTI Stakeholders Group:
Andreas Sfakianakis, Christian Doerr, Jart Armin, Marco Riccardi, Mees
Wim, Neil Thaker, Pasquale Stirparo, Paul Samwel, Pierluigi Paganini, Shin
Adachi, Stavros Lingris (CERT EU) and Thomas Hemker.
Editors
Marco Barros Lourenço (ENISA) and Louis Marinos (ENISA).
Contact
For queries on this paper, please use
[email protected].
For media enquiries about this paper, please use [email protected].
18
Legal notice
Notice must be taken that this publication represents the views and
interpretations of ENISA, unless stated otherwise. This publication
should not be construed to be a legal action of ENISA or the ENISA
bodies unless adopted pursuant to the Regulation (EU) No
526/2013. This publication does not necessarily represent state-of
the-art and ENISA may update it from time to time.
Third-party sources are quoted as appropriate. ENISA is not
responsible for the content of the external sources including
external websites referenced in this publication.
This publication is intended for information purposes only. It must
be accessible free of charge. Neither ENISA nor any person acting
on its behalf is responsible for the use that might be made of the
information contained in this publication.
Copyright Notice
© European Union Agency for Cybersecurity (ENISA), 2020
Reproduction is authorised provided the source is acknowledged.
Copyright for the image on the cover: © Wedia. For any use or
reproduction of photos or other material that is not under the
ENISA copyright, permission must be sought directly from the
copyright holders.
ISBN: 978-92-9204-354-4
DOI: 10.2824/552242
19
All rights reserved. Copyright ENISA 2020.
https://www.enisa.europa.eu