Click here to close now.


Wearables Authors: Pat Romanski, Yeshim Deniz, Elizabeth White, SmartBear Blog, Yakov Fain

News Feed Item

Spammers Target Mobile Users with More Than 350,000 Unique SMS Spam Variants in 2012

Cloudmark, Inc., the global leader in messaging threat protection for communication service providers, today unveiled new research demonstrating the sophisticated and varied methods used by attackers to target mobile users. Cloudmark’s comprehensive 2012 Messaging Threat Report revealed there were more than 350,000 unique unsolicited mobile spam variants in 2012, with the highest churn rate in December with more than 53,000 unique variants alone.

Spammers have favourite categories of attacks and frequently change individual messages in order to try and evade detection, resulting in a large number of variants. The report reveals that the most common unsolicited spam purported to be gift card offerings (44%), iPhone and iPad free giveaways (11%) and, in the UK in particular, Payment Protection Insurance (PPI) compensation (3%), which appeared after legislators determined that refunds were due to loan recipients who had been mis-sold the insurance.

The report findings are gathered through the Cloudmark-powered GSMA Spam Reporting Service, launched at Mobile World Congress in 2012. Mobile users can report their unsolicited spam by forwarding it to ‘7726’ spelling out SPAM on their keyboard. Suspicious texts submitted to this service help Cloudmark tackle spam on behalf of participating carriers, who receive comprehensive reports with detailed information on spam content, senders and reporters, which enables them to block numbers and reduce further spam.

Neil Cook, CTO at Cloudmark, said: “Global smartphone adoption rapidly increased in 2012, with smartphone users passing the 1 billion mark and this has consequentially resulted in a hike in mobile messaging spam. As opposed to email, we often automatically trust that our SMS must come from someone we know or have done business with and attackers are well aware of this wide acceptance, using it to their advantage. Our research is highlighting the growth of sophisticated mobile threats as new mobile technologies develop and 2013 will see a rise in this sophistication.”

The 2012 Messaging Threat Report identifies the top scam trends that will continue in 2013, such as the first Android botnet to be used to send SMS spam and the use of blended messaging threats to dupe mobile users.

SpamSoldier—Android Botnet Spreads SMS Spam

The SpamSoldier Android Botnet, initially seeded via SMS messages, purported to offer free versions of popular mobile games. Unknown to users, the downloaded game files contained both an initial loader program and a pirated copy of the game. When mobile users ran the game, the loader program sent SMS spam, deleted itself and installed the pirated game.

The sophistication of SpamSoldier was further highlighted as the loader simultaneously added a filter to block incoming SMS messages, preventing the user from being notified that they were spamming their contacts. During the period when the spam was first detected in November to when it was taken down in December, it is estimated that the spammer sent between five and ten million SMS messages, resulting in several thousand mobile devices being infected with the malware.

Blended Messaging Threats Bring New Level of Sophistication

Blended messaging threats also built momentum during 2012. These attacks used a combination of email, SMS messaging, instant messaging conversations and mining of social network relationships to send spam. With Affiliate Webcam Spam, for example, spammers start by sending out a sequence of SMS messages that to appear to be one half of an interactive conversation. Scammers then coax the mobile user into ‘conversing’, by sending predetermined questions or answers to the mobile user. From SMS, scammers then entice the user to converse on other platforms such as instant messenger to ultimately lead them to a webcam site which offers an affiliate program that pays $40 per sign up.

Free Offers Most Likely to Dupe Mobile Users

The 2012 Messaging Threat Report also identified the most popular method to dupe mobile users is by offering items for free. ‘Receive a gift card’ and having a ‘trial of an iPad or iPhone’ totaled more than 50 percent of the volume of SMS spam.

This type of ‘giveaway’ spam often requires the mobile user to offer privacy-compromising information via a survey and multiple click-throughs to various sites to qualify for the free ‘gift.’ Spammers are able to extract the user’s personal information to continue to push their scam campaign. Mobile users can qualify to receive the gift but often the costs associated with receiving the product outweigh the gift.

To avoid mobile users becoming victims of unsolicited SMS spam, Cloudmark is offering five tips:

  • Mobile users are strongly encouraged to forward spam texts to their carrier via “7726” spelling out “SPAM” on the keypad
  • Do not text “STOP.” This response only works with text alerts that the recipient has legitimately signed up to, and has the reverse effect for spam texts – merely confirming that the number is live and encouraging the spammer to continue to target that phone
  • Only download mobile applications from reputable app stores and read the terms of service closely
  • Never respond to an SMS requesting login details or other personal details – particularly if it claims to be a bank or financial institution
  • Speak to your mobile operator to see if you can set up content filters on your mobile account so that premium rate texts cannot be charged and adult content displayed.

Notes to Editors

For the complete Cloudmark 2012 Messaging Threat Report, please visit:

About Cloudmark

Cloudmark builds messaging security software that protects communications service provider networks and their subscribers against the widest range of messaging threats. Only the Cloudmark Security Platform™ delivers instant security and control across diverse messaging environments, enabling communications service providers to create a safe user experience, protect revenue and safeguard their brand, while streamlining infrastructure and reducing operational costs. Cloudmark's patented solutions protect more than 120 tier-one customers worldwide, including AT&T, Verizon, Swisscom, Comcast, Cox and NTT. For more information, please visit

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, along with new ways to engage with users.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl...
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Valley. The program, to be aired during the peak viewership season of the year, will have a major impac...
SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the cloud and the best price/performance value available. ProfitBricks was named one of the coolest Clo...
Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc. In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, will discuss how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting – a sustainable solution for the data required to manage I...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user experience, both offline and online. The focus of this talk will be on IBM Cloudant, Apa...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, will look at different existing uses of peer-to-peer data sharing and how it can become useful in a live session to...
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target - this makes the integration of these separate pipelines and the coordination of software upd...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity ...