Feeds

PDF spam tsunami hits email inboxes

Junk mail leaps 30 per cent

The Power of One eBook: Top reasons to choose HP BladeSystem

An aggressive spam campaign designed to ramp up the share price of a convenience store firm led to a 30 per cent increase in the volume of spam circulating across the net at its peak on Tuesday, according to net security firm Sophos.

The junk mail messages, containing an attached PDF file, urge recipients to buy shares in a a firm called Prime Time Group Inc, which markets wireless products to young people, as well as running a number of convenience stores. It's a typical pump-and-dump scam, albeit on a massive scale.

Sophos's spam traps across the world have intercepted examples of junk mails - which focus on the firm's plans open two new stores in Puerto Rico.

The massive spike in spam was first witnessed at Sophos's spamtraps in Germany at 16:40 BST on Tuesday 7 August, but was quickly seen arriving at other monitoring stations around the world. The email messages are being sent from compromised home PCs, turned into zombie relay stations by hackers.

Shares in Prime Time Group rose 60 per cent on the back of the junk mail campaign. There is nothing to suggest that the firm itself is involved. Prime Time Group has launched an investigation aimed at identifying whoever is selling its stock short in the hope of making a quick (possibly fraudulent) buck.

Pump-and-dump scams are email campaigns that seek to encourage armchair investors to sink their cash into a particular firm's stock. The goal is to quickly inflate interest in low-value stock with bogus insider info in order to ramp up share prices, then sell at a profit before the inevitable crash and burn. Meanwhile, those taken in by the ruse are left holding virtually worthless shares.

Earlier this year, the US Securities and Exchange Commission (SEC) had suspended trading in 35 companies as they were found to be commonly referenced in pump-and-dump stock email campaigns.

Pump-and-dump stock campaigns currently account for approximately 25 percent of the world's spam, according to Sophos. But, it said the Prime Time spam campaign is on a different level.

"The scale of this stock pump-and-dump spam campaign is like nothing we've seen before, and it looks as though it is working for the cybercriminals behind it. The share price in this company has rocketed as a result of bogus news being blasted to internet users worldwide," said Graham Cluley, senior technology consultant for Sophos.

The use of PDF files to carry spam messages is an attempt to get past basic anti-spam defences, he added. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.