skip to main content
10.1145/3345252.3345298acmotherconferencesArticle/Chapter ViewAbstractPublication PagescompsystechConference Proceedingsconference-collections
research-article

An Inquiry into Localized Email Spam

Published:21 June 2019Publication History

ABSTRACT

Although email spam has been decreasing in recent years, it is still a significant problem. Unsolicited messages are not only an annoying waste of time, but may also lead users to dubious websites where their personal information is collected or malicious code is executed. In this paper, we study a relatively new trend in the world of spamming, localization of spam email. It seems spammers are now targeting people in smaller countries, such as Finland, by sending junk mail in their native languages. As a case study, we analyze a set of over 300 spam email messages written in Finnish and study how localization of messages is used to convince the victims to fall into spammers' traps. Our results indicate that localized and targeted spam is a significant threat which needs to be better addressed when planning security measures and educating the public.

References

  1. R. Bapat, A. Mandya, X. Liu, B. Abraham, D. E. Brown, H. Kang, and M. Veeraraghavan. 2018. Identifying malicious botnet traffic using logistic regression. In 2018 Systems and Information Engineering Design Symposium (SIEDS). 266--271.Google ScholarGoogle Scholar
  2. N. Farrell. 2008. Cisco says that 90 percent of email is spam. https://www.theinquirer.net/inquirer/news/1050056/cisco-90-percent-email-spam. (2008). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  3. H.Y. Ha. 2004. Factors infuencing consumer perceptions of brand trust online. Journal of Product & Brand Management 13, 5 (2004), 329--342.Google ScholarGoogle ScholarCross RefCross Ref
  4. K-Ruoka. 2018. Varoitus huijauskilpailusta. https://www.k-ruoka.fi/artikkelit/k-kaupassa/varoitus-huijauskilpailusta. (2018). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  5. J. Kemppi. 2019. S-Pankin nimissä liikkuu huijareiden kalasteluviesti älä missään tapauksessa avaa linkkiä. https://www.iltalehti.f/digiuutiset/a/2eaae586-b101-4918-b725-8619f125ac30. (2019). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  6. C. Kreibich, C. Kanich, Levchenko K., Enright B., G.M. Voelker, V. Paxson, and S. Savage. 2009. Spamcraft: An Inside Look At Spam Campaign Orchestration. https://www.usenix.org/legacy/event/leet09/tech/full_papers/kreibich/kreibich.pdf. (2009). Usenix conference 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Kärkkäinen. 2017. Varo "Prisman lahjakorttia" hinnaksi tulee 78 / kk. https://www.is.f/digitoday/tietoturva/art-2000005383417.html. (2017). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  8. T. Shcherbakova M. Vergelis, N. Demidova. 2018. Spam and phishing in Q3 2018. https://securelist.com/spam-and-phishing-in-q3-2018/88686/. (2018). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  9. D. Oliveira, H. Rocha, H. Yang, D. Ellis, S. Dommaraju, M. Muradoglu, D. Weir, A. Soliman, T. Lin, and N. Ebner. 2017. Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Infuence and Life Domains in Predicting Susceptibility to Phishing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, 6412--6424. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Penman. 2018. Is the Brit Method a scam? Our investigation into the get-rich-quick binary trading scheme. https://www.mirror.co.uk/news/is-brit-method-scam-9036351. (2018). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  11. S. Rauti and V. Leppänen. 2017. You have a Potential Hackers Infection: A Study on Technical Support Scams. In 2017 IEEE International Conference on Computer and Information Technology (CIT). 197--203.Google ScholarGoogle Scholar
  12. S-Pankki. 2018. Huijausviestejä liikkeellä S-Pankin nimissä. https://www.s-pankki.fi/fi/tiedotteet/2018/huijausviesteja-liikkeella-s-pankin-nimissa2/. (2018). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  13. S. Sjouwerman. 2018. Targeted Attacks Replace Spam Campaigns. https://blog.knowbe4.com/targeted-attacks-replace-spam-campaigns. (2018). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  14. A. K. Sood and S. Zeadally. 2016. Drive-By Download Attacks: A Comparative Study. IT Professional 18, 5 (Sep. 2016), 18--25.Google ScholarGoogle ScholarCross RefCross Ref
  15. Statista. 2018. Spam: share of global email trafc 2014--2018. https://www.statista.com/statistics/420391/spam-email-trafc-share/. (2018). Accessed: 2019-03-17.Google ScholarGoogle Scholar
  16. X. Zhang, Z. Li, S. Zhu, and W. Liang. 2016. Detecting Spam and Promoting Campaigns in Twitter. ACM Trans. Web 10, 1, Article 4 (Feb. 2016), 28 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. U. Zurutuza, E. Ezpeleta, and J.M.G. Hidalgo. 2016. A study of the personalization of spam content using Facebook public information. Logic Journal of the IGPL 25, 1 (08 2016), 30--41.Google ScholarGoogle Scholar

Index Terms

  1. An Inquiry into Localized Email Spam

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CompSysTech '19: Proceedings of the 20th International Conference on Computer Systems and Technologies
      June 2019
      365 pages
      ISBN:9781450371490
      DOI:10.1145/3345252

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 June 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate241of492submissions,49%
    • Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader