<strong>2026W15 Report</strong> settimanale =&gt; 06/04 2K26 - 12/04 2K26&nbsp;<strong>campagne MalSpam</strong> target<strong> Italia</strong>
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章标题是关于TG Soft CRAM的每周报告,特别是意大利的恶意垃圾邮件活动。日期范围是从4月6日到12日。文中提到全球和意大利的活动数量都比前一周有所下降。主要恶意软件家族包括AgentTesla、FormBook和Remcos。 接下来,文章提到监测到58次活动,其中8次使用意大利语。峰值出现在4月9日,全球活动达到19次,意大利语活动在8日和9日各有3次。恶意软件类型中,脚本文件占70.69%,MSIL文件占15.52%,WIN32可执行文件占10.34%。 最后,文章还提到了不同主题的恶意软件传播情况,并邀请读者查看三月份的报告。 现在我要把这些信息浓缩到100字以内,重点突出关键数据和趋势。不需要复杂的结构,直接描述内容即可。 </think> TG Soft CRAM报告称,在2026年4月6日至12日期间,意大利及全球恶意垃圾邮件活动有所减少。主要恶意软件家族包括AgentTesla、FormBook和Remcos。监测到58次活动,其中8次使用意大利语。峰值出现在4月9日(全球19次),意大利语活动在8日和9日各有3次。脚本文件占比最高(70.69%),其次是MSIL(15.52%)和WIN32(10.34%)。 2026-4-7 08:26:48 Author: www.tgsoft.it(查看原文) 阅读量:0 收藏

      

week15

Weekly report by the TG Soft CRAM, concerning Italian malspam campaigns.

Below are the details of the campaigns released
during the week from 06 April 2026 to 12 April 2026.

During the week under review, both global campaigns and campaigns in Italian saw a decline compared with the previous week


The week was characterized by Password Stealer of the Families:
AgentTesla, FormBook and Remcos.

The blue bar shows the total number of campaigns monitored in Italy in each week, while the red bar concerns campaigns in Italian (and targeting Italy).

We monitored 58
campaigns during the week, 8 of which used Italian as their language.

Per poter capire come sono suddivise le varie settimane (Week) di seguito una piccola tabella che indica la suddivisione dei periodi presi in considerazione:

Week from to
Week_12 16/03 22/03
Week_13 23/03 29/03
Week_14 30/03 05/04
Week_15 06/04 12/04

During the week, the peak in global campaigns was recorded on Thursday 09 April, with 19 different campaigns per day. The peak of campaigns in Italian was recorded on Wednesday 8 and Thursday 09 April, with 3 different campaigns on each day respectively, as shown in the graph below:

In the following chart we see the malware families spread globally for each day of the week:

Instead in this graph we see the distribution based on malware family. In the past week 10 different families were detected:

The top-ranking samples this week are Script files accounting for 70,69%.

MSIL files follow in second place with 15,52%.
As for third place, we find  WIN32 executable files with10,34%.


In the chart below we can see the various types of language used to develop malware:

In the following graph we see the distribution of the various types of languages divided by day:

In this graph we can see the malware families spread during the week with target Italy (in Italian) and composed of 4 families:

 

The campaigns in Italian analyzed by the TG Soft C.R.A.M. were grouped according to macro categories, obtained from the subject of the email message used for malware distribution (malspam). Below we see the subjects used in the various campaigns divided by day and type of malware.


06/04/2026
Remcos 
spread through a campaign themed "Requests".


07/04/2026

AgentTesla spread through a campaign themed "Orders".


08/04
/2026

Downloader spread through a campaign themed "Orders".
FormBook 
spread through a campaign themed "Requests".
Remcos 
spread through a campaign themed "Bank transfers".

09/04
/2026

AgentTesla spread through a campaign themed "Orders".
FormBook 
spread through a campaign themed "Payments".
Remcos 
spread through a campaign themed "Requests"

Check out the March campaigns

We invite you to check out the March 2026 reports, to stay up-to-date on the malspam campaigns circulating in Italy:

Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”


文章来源: http://www.tgsoft.it/italy/news_archivio.asp?id=1730
如有侵权请联系:admin#unsafe.sh