February 2nd, 2014
For the 20th consecutive competition, OnlyMyEmail’s MX-Defender blocked more spam than any other filtering system in the Virus Bulletin VBSpam Challenge and secured yet another first place finish.
During the latest competition, which ran for 13 consecutive days, OnlyMyEmail accurately blocked more spam than all other spam filters, missing only one spam email out of 82,206 total. This represents a capture rate of 99.9988%.
In addition, OnlyMyEmail did not create a single false-positive result (blocking of legitimate emails) during the test, resulting in another VBSpam+ award.
By comparison, well known solutions performed much worse, with Kaspersky missing 84 spam emails, Sophos allowing 159 and McAfee failing to capture 442 emails from the exact same live feed of messages; with Kaspersky and McAfee both blocking multiple legitimate emails as well.
The worst performers were Spamhaus ZEN+DBL which allowed 7,439 spam emails for a capture rate of 90.95% and the SURBL which missed 53,864 meaning they only blocked 34.48% of all spam.
January 27th, 2014
There’s a very successful spam campaign out now spoofing legitimate ADP payroll invoice emails. They most commonly arrive as:
Subject: Payroll Invoice
In reality, they come from previously infected personal computers spanning the globe.
An example of the above:
‘from 60-240-131-86.static.tpgi.com.au ([184.108.40.206])
It doesn’t take a trained email professional to realize that’s not ADP emailing.
March 23rd, 2013
It seems that almost every tool Google provides is readily adopted by spammers and scammers alike. Not a day goes by that we don’t see spam and Phishing fraud and other identity theft emails from hacked Gmail and Google Groups accounts and often abusing systems such as Google Docs.
The ubiquity of these free services makes for the perfect no-cost social engineering platform for hackers to use for launching their attacks.
A current Phishing campaign uses stolen Gmail accounts to steal the credentials to other email accounts, allowing spammers to increase their spam volume day over day.
The most common email circulating now comes with a subject that references the sharing of a file though “Google Docs” and often has a subject line of simply:
Subject: Important Document
Since the email comes from a previously hijacked account, the recipients will typically recognize the sender’s address which makes it more likely that they will be taken in by this fraud:
March 13th, 2013
For the thirteenth consecutive evaluation, OnlyMyEmail has again blocked more spam than any other filtering system in the Virus Bulletin VBSpam Challenge and secured yet another first place finish.
The latest competition ran for 16 consecutive days, during which, OnlyMyEmail’s MX-Defender accurately filtered out more spam than all other competitors tested, missing not even one spam email out of 64,988 total. This represents a never before seen spam capture rate of 100%.
In addition, OnlyMyEmail created zero false-positive results (blocking of legitimate emails) during the test, resulting in an overall perfect score.
By comparison, the next best capture rate was a tie between Libra Esva and Scrollout with both missed 17 emails in total and created false-positives of 1 and 25 respectively. The third best blocking rate went to Zerospam which missed 73 spam emails from the same corpus. The worst performers, missing well over 300 spam emails each included: IBM, McAfee SaaS, Sophos, SPAMfighter, Vamsoft, Spamhaus ZEN+DBL and SURBL.
March 10th, 2013
A lot of spam and Phishing campaigns rely upon tricking the recipient into thinking they’ve received a billing error, from an otherwise legitimate source. The latest of these claim to be from ATT Wireless, and arrive with realistic sending addresses and subject lines, such as:
Subject: Your AT&T wireless bill is ready to view
From: “AT&T Customer Care” <firstname.lastname@example.org>
In reality, the sending addresses are spoofed, and these are instead sent by previously infected computers and hijacked servers, but that fact is not readily apparent to the typical email user.
What makes these types of emails so convincing is that the spammers are doing a much better job than they used to in terms of making these faked billing emails appear legitimate, such as this example we’ve seen a lot of lately:
March 4th, 2013
We fondly remember the days when PayPal Phishing frauds were easily spotted by their subject line alone. The urgent warnings about your compromised account made identity theft emails almost trivial to identify.
But, as with all things technology, the lame Phishing attempts too have evolved, and they’re snaring even users with moderate technology skills. The latest evolution of the PayPal identity theft fraud relies on the user’s reaction to what appears to be a standard account notice. The subject line is a receipt for payment, but to a seller with which you have not conducted a valid transaction, such as:
Subject: Receipt for your PayPal payment to Soo Duk Lee
The email itself contains standard language like:
You sent a payment of $149.49 USD to Soo Duk Lee (email@example.com)
Thanks for using PayPal. To see all the transaction details, log in to your PayPal account.
It may take a few moments for this transaction to appear in your account.
Here’s a complete copy of such a fraud:
February 21st, 2013
With the fake Better Business Bureau Trojan Horse campaign, we find yet another infectious email that is socially engineered so well, that users often release such messages from quarantine; even after spam filtering has clearly identified the emails as a Virus carrying Trojan Horse.
The emails typically arrive with spoofed headers such as:
Subject: FW: Complaint Case 091921
From: “Better Business Bureau” <Kerri_Rucker@newyork.bbb.org>
In order to appear legitimate and to try and evade simple spam filtering systems, the Complaint Case number will be randomized, and the spoofed sending email address will vary as well.
The content will include vague yet serious sounding allegations, such as:
The Better Business Bureau has received the above-referenced complaint from one of your customers regarding their dealings with you. The details of the consumer’s concern are included on the reverse. Please review this matter and advise us of your position.
A full copy of such the bogus email:
January 14th, 2013
Sometimes spam, viruses and Trojan Horse emails are so convincing that they manage to trick users even after spam filtering has clearly identified the emails for their true nature.
The recent spate in bogus “Your order is awaiting verification!” emails claiming to be from Staples office supplies is a pretty good example.
Despite being clearly marked as viruses, we’ve seen many users attempt to resend these blocked messages to themselves, apparently believing that our blocking these messages represents a false-positive result on the part of our filtering, whereas the opposite is the case.
The emails typically arrive with spoofed headers such as:
Subject: Your order is awaiting verification!
From: ”Staples Advantage Orders” <Order@staplesadvantage.com>