* * * * *
There just aren't enough clue-by-fours
> In this paper I present an analysis of 1,976 unsolicited answers received
> from the targets of a malicious email campaign, who were mostly unaware
> that they were not contacting the real sender of the malicious messages. I
> received the messages because the spammers, whom I had described previously
> on my blog, decided to take revenge by putting my email address in the
> ‘reply-to’ field of a malicious email campaign. Many of the victims were
> unaware that the message they had received was fake and contained malware.
> Some even asked me to resend the malware as it had been blocked by their
> anti-virus product. I have read those 1,976 messages, analysed and
> classified victims’ answers, and present them here.
>
> …
>
> 5. The fifth group is actually the most worrying. I call this group ‘MY
> ANTI-VIRUS WORKED, PLEASE SEND AGAIN’, as these are recipients who mention
> that their security product (mostly anti-virus) warned them against an
> infected file, but they wanted the file to be resent because they could not
> open it. The group consisted of 44 individuals (2.35%).
>
Via inks [1], “Virus Bulletin :: VB2019 paper: 2,000 reactions to a malware
attack — accidental study [2]”
Over a year ago, the Corporate Overlords of The Ft. Lauderdale Office of The
Corporation started sending us phishing emails [3] in order to “train us” to
recognize scams. Pretty much all it did for me was to treat all emails from
our Corporate Overlords asking for information as a phishing attempt (it's
also made easier as each phishing email has a specific header designating it
as such to ensure they get through their own spam firewall—I am not making
this up). And I was upset over the practice as I felt our Corporate Overlords
did not trust their employees and felt they had to treat us as children (the
managed laptops [4] don't help either).
But reading this report is eye opening. Over 2% requested the malware be sent
again! Over 11% complained that the “attachment” did not work (they were
infected) and another 14% asked where was the “attachment”—what?
I … this … um … what?
I should not be surprised. I mean, someone has to fall for the scams [5] else
the scammers wouldn't waste their time. The scary bit is that this validates
what our Corporate Overlords are doing.
Sigh.
But Bunny will find the following response group amusing:
> 10. One of the biggest surprises were 31 members of group number 10 (1.66%)
> who spent time pointing out all the spelling errors and typos made in the
> original message. I call this group “I'M A GRAMMAR NAZI”.
>
Via inks [6], “Virus Bulletin :: VB2019 paper: 2,000 reactions to a malware
attack — accidental study [7]”
Heh.
[1]
https://inks.tedunangst.com/l/4538
[2]
https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-2000-
[3]
https://en.wikipedia.org/wiki/Phishing
[4]
gopher://gopher.conman.org/0Phlog:2019/08/22.1
[5]
https://www.419eater.com/
[6]
https://inks.tedunangst.com/l/4538
[7]
https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-2000-
Email author at
[email protected]