Advances in spam detection meant that spam operators had to find ways to circumvent new technologies. For instance, Asprox made significant improvements in their spam and module architecture whereas Pushdo made use of decoy network traffic.Recently, we have discovered a new simple method used by a spam botnet we named StealRat. It consists of 3 […]
Latest Comments