Cybercriminals sent out fake e-mails on behalf of various companies, such as DHL, FedEx and the U.S. Postal Service.
Experts point out that, since its introduction in 2007, Asprox generated a very substantial share of the world's spam. Despite the fact that over the years information Asprox was not much, it is known that the owners of the botnet improved it by making more effective.
For example, we know that at the moment Asprox has a modular structure that allows operators of the botnet, if necessary, to extend its functionality.
In addition, it is known that by spreading malicious Asprox module that steal information from infected computers. This module allows its owners to "collect" from infected systems, user names and passwords to the accounts. For example, e-mail, Web sites and FTP-servers.
|Asprox Spam Botnet|
To force victims into opening infected files or malicious links contained in the letter, the attackers use a variety of patterns of letters in different languages.
To bypass spam filters Asprox uses compromised email-accounts.