Kaspersky Lab has detected the mass mailing of unsolicited messages that include links to video advertisements
Kaspersky Lab, a leading developer of Internet threat management solutions that protect against all forms of malicious software including viruses, spyware, hackers and spam, has announced that the Kaspersky Lab Content Filtering Research group recorded a mass mailing that contained a link directing users to a video advert on YouTube.
There were several message variations in the mass mailing, but they all included the same link to the video hosting site. YouTube is a potentially attractive resource for distributing spam due to its popularity worldwide. In 2007, Kaspersky Lab forecast the possible use of YouTube as a medium for disseminating spam. However, this is the first time the company’s specialists have detected a mass mailing specifically intended to make users view an advertising video.
"Naturally, this type of advertising is more interesting and gets more hits," says Darya Gudkova, Head of Content Analysis & Research at Kaspersky Lab. "Two years ago spammers used the YouTube name and the promise of interesting videos to lure users to advertising sites. Now the links really do lead to this popular video hosting site which is being used to store unsolicited advertising content."
This is not the first time a creative approach has been used by spammers this year. In April, messages were detected that contained non-standard, complex images advertising spammer services. Noise techniques have also been applied to graphical files, causing problems for spam filters.
Kaspersky Lab would like to reiterate how important it is for users to keep spam filters turned on in order to block unwanted or potentially hazardous correspondence. The spam filter training option in the company’s products should also be utilised to constantly improve protection against all types of unsolicited mass mailings.
To find out more about Computer Threats visit: http://www.kaspersky.co.uk/threats.
To read the latest security news please visit: http://threatpost.com/