<strong>2026W07 Report</strong> settimanale =&gt; 09/02 2K26 - 15/02 2K26&nbsp;<strong>campagne MalSpam</strong> target<strong> Italia</strong>
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读这篇文章,了解它的主要内容。 文章是关于TG Soft CRAM的每周报告,主要讨论意大利的恶意软件活动。时间范围是从2026年2月9日到15日。看起来全球的恶意软件活动有所下降,但意大利语的活动却在增加。文中提到了几个恶意软件家族,比如AgentTesla、FormBook等。 还有图表显示每周的活动情况,以及不同类型的恶意软件文件分布情况。此外,文章还列出了不同日期和主题的恶意软件活动,并邀请读者查看之前的报告。 所以,我需要把这些关键点浓缩到100字以内。要包括时间范围、意大利语活动增加、恶意软件家族、图表分析以及邀请查看报告的部分。 可能的结构是:时间范围+主要发现+分析内容+其他信息。比如:“TG Soft CRAM每周报告(2026年2月9日至15日)显示意大利语恶意软件活动增加,涉及AgentTesla等家族。全球活动下降,但意大利语攻击上升。图表分析了文件类型和主题分布,并邀请查看往期报告。” 这样既涵盖了主要信息,又符合字数限制。 </think> TG Soft CRAM每周报告(2026年2月9日至15日)显示意大利语恶意软件活动增加,涉及AgentTesla等家族。全球活动下降,但意大利语攻击上升。图表分析了文件类型和主题分布,并邀请查看往期报告。 2026-2-9 10:30:53 Author: www.tgsoft.it(查看原文) 阅读量:3 收藏

      

week07

Weekly report by the TG Soft CRAM, concerning Italian malspam campaigns.

Below are the details of the campaigns released
during the week from 09 February 2026 to 15 February 2026.

During the monitored week, global campaigns decreased compared to the previous week, with Italian-language campaigns on the rise.


The week was characterized by Password Stealer of the Families:
 AgentTeslaFormBookPureLogsRemcosSTRRAT e VIPKeylogger.

The blue bar shows the total number of campaigns monitored in Italy in each week, while the red bar concerns campaigns in Italian (and targeting Italy).

We monitored 72
 campaigns during the week, 13 of which used Italian as their language.

In order to understand how the various weeks are divided, below is a small table showing the breakdown of the considered period:

Week from to
Week_04 19/01 25/01
Week_05 26/01 01/02
Week_06 02/02 08/02
Week_07 09/02 15/02

During the week, the peak of global campaigns was recorded on TuesdayFebruary  10, with 22 different campaigns per day. The peak of campaigns written in Italian was recorded on WednesdayFebruary 11 and Thursday, February 12 with 4 different campaigns per day each, as shown in the graph below:

In the following chart we see the malware families spread globally for each day of the week:

Instead in this graph we see the distribution based on malware family. In the past week 13 different families were detected:

The top-ranking samples this week are SCRIPT files accounting for 36,11%.

MSIL files follow in second place with 27,78%.
As for third place, we find WIN32 executable files with 20,83%.

In the chart below we can see the various types of language used to develop malware:

In the following graph we see the distribution of the various types of languages divided by day:

In this graph we can see the malware families spread during the week with target Italy (in Italian) and composed of 7 families:

 

The campaigns in Italian analyzed by the TG Soft C.R.A.M. were grouped according to macro categories, obtained from the subject of the email message used for malware distribution (malspam). Below we see the subjects used in the various campaigns divided by day and type of malware. 

09/02/2026

AgentTeslaspread through a campaign themed "Orders".

10/02/2026

AgentTesla spread through a campaign themed "Orders".

STRRAT spread through a campaign themed "Offers".
Remcosspread through a campaign themed "Bank Transfers".

11/02/2026

VIPKeylogger spread through a campaign themed "Quotes".

Downloader spread through a campaign themed "Orders".

FormBook - spread through a campaign themed "Bookings".

PureLogs spread through a campaign themed "Orders".


12/02/2026

AgentTesla spread through two campaigns themed "Quotes".
FormBook spread through a campaign themed "Payments".
Downloader spread through a campaign themed "Orders".

13/02/2026

AgentTeslaspread through a campaign themed "Orders".

Check out the January/Febraury campaigns

We invite you to check out the January and Febraury 2026 reports, to stay up-to-date on the malspam campaigns circulating in Italy:

Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”


文章来源: http://www.tgsoft.it/italy/news_archivio.asp?id=1714
如有侵权请联系:admin#unsafe.sh