<strong>2026W03 Report</strong> settimanale =&gt; 12/01 2K26 - 18/01 2K26&nbsp;<strong>campagne MalSpam</strong> target<strong> Italia</strong>
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,找出关键信息。 文章是TG Soft CRAM的每周报告,关注意大利的恶意垃圾邮件活动。时间范围是从2025年1月12日到2026年1月18日。全球和意大利的恶意软件活动都有所增加,主要恶意软件家族是AgentTesla和Remcos。 接下来,文章提到监测到29个活动,其中7个使用意大利语。峰值出现在周一和周二。图表显示恶意软件家族的分布情况,SCRIPT文件占58.62%,MSIL和WIN32各占约10%。 此外,恶意软件通过不同主题传播,比如订单、请求、支付等。最后还有邀请查看之前的报告,并提到信息引用的要求。 现在我要把这些信息浓缩到100字以内。重点包括:报告内容、时间范围、活动增加、主要恶意软件家族、监测到的活动数量、语言分布、峰值时间以及传播主题。 可能的结构:TG Soft CRAM报告指出,在2025年1月12日至2026年1月18日期间,全球及意大利的恶意垃圾邮件活动增加,主要由AgentTesla和Remcos家族主导。监测到29个活动,其中7个使用意大利语。峰值出现在周一(全球)和周二(意大利)。恶意软件通过不同主题传播。 </think> TG Soft CRAM报告指出,在2025年1月12日至2026年1月18日期间,全球及意大利的恶意垃圾邮件活动增加,主要由AgentTesla和Remcos家族主导。监测到29个活动,其中7个使用意大利语。峰值出现在周一(全球)和周二(意大利)。恶意软件通过不同主题传播。 2026-1-12 09:4:29 Author: www.tgsoft.it(查看原文) 阅读量:3 收藏

      

week03

Weekly report by the TG Soft CRAM, concerning Italian malspam campaigns.

Below are the details of the campaigns released
during the week from 12 January 2025 to 18 January 2026.

During the monitored week, global campaigns increased compared to previous week, with campaigns in Italian also on the rise.

The week was characterized by Password Stealer of the Families:
AgentTesla and Remcos.

The blue bar shows the total number of campaigns monitored in Italy in each week, while the red bar concerns campaigns in Italian (and targeting Italy).

We monitored
29 campaigns during the week, 7 of which used Italian as their language.

In order to understand how the various weeks are divided, below is a small table showing the breakdown of the considered period:

Week from to
Week_52 22/12 28/12
Week_01 29/12 04/12
Week_02 05/12 11/01
Week_03 12/01 18/01

During the week, the peak of global campaigns was recorded on Monday, 12 January, with seven different campaigns per day. The peak of campaigns in Italian was recorded on Tuesday, 13 January, with three different campaigns per day, as shown in the graph below:

In the following chart we see the malware families spread globally for each day of the week:

Instead in this graph we see the distribution based on malware family. In the past week 7 different families were detected:

The top-ranking samples this week are SCRIPT files accounting for 58,62%.

In joint second and third place are MSIL and WIN32 files with 10.34%.

In the chart below we can see the various types of language used to develop malware:

In the following graph we see the distribution of the various types of languages divided by day:

In this graph we can see the malware families spread during the week with target Italy (in Italian) and composed of 2 families:

 

The campaigns in Italian analyzed by the TG Soft C.R.A.M. were grouped according to macro categories, obtained from the subject of the email message used for malware distribution (malspam). Below we see the subjects used in the various campaigns divided by day and type of malware.


12/01/2026

AgentTesla spread through a campaign themed "Orders".

Remcos spread through a campaign themed "Requests".

13/01/2026

Remcos spread through a campaign themed "Payments".

Remcos spread through a campaign themed "Payments".

Remcos spread through a campaign themed "Payments".

15/01/2026

AgentTesla spread through a campaign themed "Offers".

Remcos spread through a campaign themed "Orders".

Check out the December/January campaigns

We invite you to check out the December 2025/January 2026 reports, to stay up-to-date on the malspam campaigns circulating in Italy:

Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”


文章来源: http://www.tgsoft.it/italy/news_archivio.asp?id=1706
如有侵权请联系:admin#unsafe.sh