ABSTRACT
Although email spam has been decreasing in recent years, it is still a significant problem. Unsolicited messages are not only an annoying waste of time, but may also lead users to dubious websites where their personal information is collected or malicious code is executed. In this paper, we study a relatively new trend in the world of spamming, localization of spam email. It seems spammers are now targeting people in smaller countries, such as Finland, by sending junk mail in their native languages. As a case study, we analyze a set of over 300 spam email messages written in Finnish and study how localization of messages is used to convince the victims to fall into spammers' traps. Our results indicate that localized and targeted spam is a significant threat which needs to be better addressed when planning security measures and educating the public.
- R. Bapat, A. Mandya, X. Liu, B. Abraham, D. E. Brown, H. Kang, and M. Veeraraghavan. 2018. Identifying malicious botnet traffic using logistic regression. In 2018 Systems and Information Engineering Design Symposium (SIEDS). 266--271.Google Scholar
- N. Farrell. 2008. Cisco says that 90 percent of email is spam. https://www.theinquirer.net/inquirer/news/1050056/cisco-90-percent-email-spam. (2008). Accessed: 2019-03-17.Google Scholar
- H.Y. Ha. 2004. Factors infuencing consumer perceptions of brand trust online. Journal of Product & Brand Management 13, 5 (2004), 329--342.Google ScholarCross Ref
- K-Ruoka. 2018. Varoitus huijauskilpailusta. https://www.k-ruoka.fi/artikkelit/k-kaupassa/varoitus-huijauskilpailusta. (2018). Accessed: 2019-03-17.Google Scholar
- J. Kemppi. 2019. S-Pankin nimissä liikkuu huijareiden kalasteluviesti älä missään tapauksessa avaa linkkiä. https://www.iltalehti.f/digiuutiset/a/2eaae586-b101-4918-b725-8619f125ac30. (2019). Accessed: 2019-03-17.Google Scholar
- C. Kreibich, C. Kanich, Levchenko K., Enright B., G.M. Voelker, V. Paxson, and S. Savage. 2009. Spamcraft: An Inside Look At Spam Campaign Orchestration. https://www.usenix.org/legacy/event/leet09/tech/full_papers/kreibich/kreibich.pdf. (2009). Usenix conference 2009. Google ScholarDigital Library
- H. Kärkkäinen. 2017. Varo "Prisman lahjakorttia" hinnaksi tulee 78 / kk. https://www.is.f/digitoday/tietoturva/art-2000005383417.html. (2017). Accessed: 2019-03-17.Google Scholar
- T. Shcherbakova M. Vergelis, N. Demidova. 2018. Spam and phishing in Q3 2018. https://securelist.com/spam-and-phishing-in-q3-2018/88686/. (2018). Accessed: 2019-03-17.Google Scholar
- D. Oliveira, H. Rocha, H. Yang, D. Ellis, S. Dommaraju, M. Muradoglu, D. Weir, A. Soliman, T. Lin, and N. Ebner. 2017. Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Infuence and Life Domains in Predicting Susceptibility to Phishing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, 6412--6424. Google ScholarDigital Library
- A. Penman. 2018. Is the Brit Method a scam? Our investigation into the get-rich-quick binary trading scheme. https://www.mirror.co.uk/news/is-brit-method-scam-9036351. (2018). Accessed: 2019-03-17.Google Scholar
- S. Rauti and V. Leppänen. 2017. You have a Potential Hackers Infection: A Study on Technical Support Scams. In 2017 IEEE International Conference on Computer and Information Technology (CIT). 197--203.Google Scholar
- S-Pankki. 2018. Huijausviestejä liikkeellä S-Pankin nimissä. https://www.s-pankki.fi/fi/tiedotteet/2018/huijausviesteja-liikkeella-s-pankin-nimissa2/. (2018). Accessed: 2019-03-17.Google Scholar
- S. Sjouwerman. 2018. Targeted Attacks Replace Spam Campaigns. https://blog.knowbe4.com/targeted-attacks-replace-spam-campaigns. (2018). Accessed: 2019-03-17.Google Scholar
- A. K. Sood and S. Zeadally. 2016. Drive-By Download Attacks: A Comparative Study. IT Professional 18, 5 (Sep. 2016), 18--25.Google ScholarCross Ref
- Statista. 2018. Spam: share of global email trafc 2014--2018. https://www.statista.com/statistics/420391/spam-email-trafc-share/. (2018). Accessed: 2019-03-17.Google Scholar
- X. Zhang, Z. Li, S. Zhu, and W. Liang. 2016. Detecting Spam and Promoting Campaigns in Twitter. ACM Trans. Web 10, 1, Article 4 (Feb. 2016), 28 pages. Google ScholarDigital Library
- U. Zurutuza, E. Ezpeleta, and J.M.G. Hidalgo. 2016. A study of the personalization of spam content using Facebook public information. Logic Journal of the IGPL 25, 1 (08 2016), 30--41.Google Scholar
Index Terms
- An Inquiry into Localized Email Spam
Recommendations
Hoodwinking spam email filters
CEA'07: Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and ApplicationsMany spam email filters have been proposed, however spammers regularly find new ways of hoodwinking those filters. Most of those filters are text based and hence spammers try to conceal the text which reveals the spam nature of an email. In order to ...
A Comprehensive Study of Email Spam Botnet Detection
The problem of email spam has grown significantly over the past few years. It is not just a nuisance for users but also it is damaging for those who fall for scams and other attacks. This is due to the complexity intensification of email spamming ...
Canning Spam: Proposed Solutions to Unwanted Email
Unsolicited email is a major problem for anyone who transmits or receives email on a computer, telephone, or personal digital assistant. This article describes the magnitude of the problem, the reasons for proliferation, some interventions available ...
Comments