Abstract
Spam is usually used to propagate malware. Most spam leads to click the links or attached files by disguising it with social issues, entertainers, events, Christmas or New Year greetings, and friends using social engineering techniques. As a user clicks it, the user’s system is infected with malware. The infected systems can be used to various cyber-crimes. Recently such spam has been increased and that includes executable malware. In this paper, the results of the analysis of the malware attached in spam are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Szor P (2005) The art of computer virus research and defense. Addison Wesley Professional, Reading
Yang K, Lee S, Park W, Park K, Lim J (2009) A study on the analysis and detection method for protecting malware spreading via E-mail. J KIISC 19(1):93–101
Honeynet Project. “Know Your Enemy: Honeynets.” available at http://www.honeynet.org/papers/honeynet
Miao Q, Wang Y, Cao Y, Zhang X, Liu Z (2010) APICapture—a tool for monitoring the behavior of malware. In: Proceedings of the 3rd international conference on advanced computer theory and engineering, pp 390–394
Nair VP, Jain H, Golecha YK, Gaur MS, Laxmi V (2010) MEDUSA: MEtamorphic malware dynamic analysis using signature from API. In: Proceedings of the 3rd international conference on security of information and networks, pp 263–269
Han KS, Im EG (2010) The Analysis of Malware Propagated through Spam. In: Proceedings of the 2010 winter conference of Korea information and communications society
Acknowledgments
This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the HNRC (Home Network Research Center)—TRC (Information Technology Research Center) support program supervised by the NIPA (National IT Industry Promotion Agency) (NIPA-2010-C1090-1011-0010).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Im, E.G., Han, KS. (2012). An Analysis of Malware Attached in Spam. In: Kim, K., Ahn, S. (eds) Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, vol 120. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2911-7_58
Download citation
DOI: https://doi.org/10.1007/978-94-007-2911-7_58
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2910-0
Online ISBN: 978-94-007-2911-7
eBook Packages: EngineeringEngineering (R0)