<strong>2026W11 Report</strong> settimanale =&gt; 09/03 2K26 - 15/03 2K26&nbsp;<strong>campagne MalSpam</strong> target<strong> Italia</strong>
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内。首先,我需要仔细阅读文章,理解其主要内容。 文章是关于TG Soft CRAM发布的每周报告,主要关注意大利的恶意软件活动。时间范围是从2026年3月9日到15日。报告指出,全球范围内的恶意软件活动有所减少,但意大利的活动却有所增加。 接下来,文章详细介绍了几种密码窃取器家族,如AgentTesla、FormBook、PUREHVNC和Remcos。还提到了监测到的56个活动,其中168个使用了意大利语。此外,报告中还包含了图表和表格,展示了不同日子的活动分布以及恶意软件家族的类型分布。 用户的需求是用中文总结内容,并且控制在100字以内。不需要特定的开头,直接描述内容即可。因此,我需要提炼出关键信息:意大利恶意软件活动增加、涉及的密码窃取器家族、监测到的数量以及语言使用情况。 最后,确保语言简洁明了,符合用户的要求。 </think> TG Soft CRAM报告称,在2026年3月9日至15日期间,全球恶意软件活动减少但意大利相关活动增加。主要密码窃取器家族包括AgentTesla、FormBook、PUREHVNC和Remcos。监测到56个活动,其中168个使用意大利语。 2026-3-9 09:59:57 Author: www.tgsoft.it(查看原文) 阅读量:2 收藏

      

week11

Weekly report by the TG Soft CRAM, concerning Italian malspam campaigns.

Below are the details of the campaigns released
during the week from 09 March 2026 to 15 March 2026.

During the monitored week, the number of global campaigns fell compared with last week, whilst the number of campaigns in Italian rose.


The week was characterized by Password Stealer of the Families:
AgentTesla, FormBook, PUREHVNC and Remcos.

The blue bar shows the total number of campaigns monitored in Italy in each week, while the red bar concerns campaigns in Italian (and targeting Italy).

We monitored 56
campaigns during the week, 168 of which used Italian as their language.

In order to understand how the various weeks are divided, below is a small table showing the breakdown of the considered period:

Week from to
Week_08 16/02 22/02
Week_09 23/02 01/03
Week_10 02/03 08/03
Week_11 09/03 15/03

During the week, the peak in global campaigns was recorded on Tuesday 10 March, with 19 different campaigns per day. The peak in campaigns in Italian was recorded on Thursday 12 March, with 7 different campaigns per day, as shown in the graph below:

In the following chart we see the malware families spread globally for each day of the week:

Instead in this graph we see the distribution based on malware family. In the past week 11 different families were detected:

The top-ranking samples this week are Script files accounting for 44,64%.

MSIL files follow in second place with 17,86%.
As for third place, we find Office documents (Word, Excel, PowerPoint) with 16,07%.

In the chart below we can see the various types of language used to develop malware:

In the following graph we see the distribution of the various types of languages divided by day:

In this graph we can see the malware families spread during the week with target Italy (in Italian) and composed of 5 families:

 

The campaigns in Italian analyzed by the TG Soft C.R.A.M. were grouped according to macro categories, obtained from the subject of the email message used for malware distribution (malspam). Below we see the subjects used in the various campaigns divided by day and type of malware.


09/03/2026

Downloader spread through a campaign themed "Requests".
FormBook spread through a campaign themed "Invoices".

10/03/2026

Downloader spread through a campaign themed "Orders".
FormBook 
spread through a campaign themed "Miscellaneous".
PUREHVNC - spread through a campaign themed"Orders".
Remcos - spread through a campaign themed "Orders".


11/03
/2026

AgentTesla spread through a campaign themed "Account Statement".
Downloader 
spread through a campaign themed "Orders".

12/03
/2026

AgentTesla spread through five campaigns themed: "Orders", "Requests", "Bank transfers", "Invoices" e "Miscellaneous".
FormBook spread through a campaign themed "Invoices".
PUREHVNC spread through a campaign themed "Miscellaneous".13/03/2026
Remcos spread through a campaign themed "Payments".

Check out the Febraury/March campaigns

We invite you to check out the Febraury and March 2026 reports, to stay up-to-date on the malspam campaigns circulating in Italy:

Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”


文章来源: http://www.tgsoft.it/italy/news_archivio.asp?id=1721
如有侵权请联系:admin#unsafe.sh