<strong>2026W08 Report</strong> settimanale =&gt; 16/02 2K26 - 22/02 2K26&nbsp;<strong>campagne MalSpam</strong> target<strong> Italia</strong>
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章,抓住主要内容。 文章是TG Soft CRAM的每周报告,主要关于意大利的恶意软件活动。时间范围是从2026年2月16日到22日。全球和意大利的恶意软件活动都有所增加。主要提到几种密码窃取器家族,比如AgentTesla、FormBook等。 文中还提到了监控到85个活动,其中16个使用意大利语。峰值出现在17日,全球26个活动,意大利6个。还有图表展示了恶意软件类型和语言分布。 用户可能需要一个简洁明了的摘要,用于快速了解报告内容。所以我要把重点放在时间范围、活动增加、主要家族、监控数据和峰值上。 最后,确保字数不超过100字,并且直接描述内容,不使用“这篇文章”之类的开头。 </think> TG Soft CRAM报告指出,2026年2月16日至22日期间,全球及意大利恶意软件活动增加,涉及AgentTesla、FormBook等密码窃取器家族。共监测到85个活动,其中16个为意大利语目标。峰值出现在17日(全球26个、意大利6个)。 2026-2-16 09:31:7 Author: www.tgsoft.it(查看原文) 阅读量:1 收藏

      

week08

Weekly report by the TG Soft CRAM, concerning Italian malspam campaigns.

Below are the details of the campaigns released
during the week from 16 February 2026 to 22 February 2026.

During the monitored week, global campaigns increased compared to the previous week, with campaigns in Italian also on the rise.

The week was characterized by Password Stealer of the Families:
AgentTesla, FormBook, PhantomStealer, QuasarRAT, Remcos and VIPKeylogger.

The blue bar shows the total number of campaigns monitored in Italy in each week, while the red bar concerns campaigns in Italian (and targeting Italy).

We monitored 85
campaigns during the week, 16 of which used Italian as their language.

In order to understand how the various weeks are divided, below is a small table showing the breakdown of the considered period:

Week from to
Week_05 26/01 01/02
Week_06 02/02 08/02
Week_07 09/02 15/02
Week_08 16/02 22/02

During the week, the peak of global campaigns was recorded on Tuesday, 17 February, with 26 different campaigns per day. The peak of campaigns in Italian was recorded on Tuesday, 17 February, with 6 different campaigns per day, as shown in the graph below:

In the following chart we see the malware families spread globally for each day of the week:

Instead in this graph we see the distribution based on malware family. In the past week 10 different families were detected:

The top-ranking samples this week are Script files accounting for  37,65%.

MSIL files follow in second place with 24,71%.
As for third place, we find WIN32 executable files with 22,35%.

In the chart below we can see the various types of language used to develop malware:

In the following graph we see the distribution of the various types of languages divided by day:

In this graph we can see the malware families spread during the week with target Italy (in Italian) and composed of 7 families:

 

The campaigns in Italian analyzed by the TG Soft C.R.A.M. were grouped according to macro categories, obtained from the subject of the email message used for malware distribution (malspam). Below we see the subjects used in the various campaigns divided by day and type of malware.


16/02/2026

AgentTeslaspread through a campaign themed "Orders".
FormBook spread through a campaign themed "Orders".

17/02/2026

Remcos spread through two campaigns themed "Shipping" e "Bank transfers".

AgentTeslaspread through two campaigns both themed "Orders".

PhantomStealer spread through a campaign themed "Quotations".

QuasarRAT - spread through a campaign themed "Orders".


18/02/2026

Downloader spread through a campaign themed "Invoices".
FormBook spread through two campaigns themed "Invoices" and "Requests".
VIPKeylogger
 spread through a campaign themed "Orders".

19/02/2026

VIPKeylogger spread through a campaign themed "Offers".

Remcos - spread through a campaign themed "Quotations".

20/02/2026

VIPKeylogger spread through a campaign themed "Offers".

FormBookspread through a campaign themed "Various".

Check out the January/Febraury campaigns

We invite you to check out the January and Febraury 2026 reports, to stay up-to-date on the malspam campaigns circulating in Italy:

Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”


文章来源: http://www.tgsoft.it/italy/news_archivio.asp?id=1715
如有侵权请联系:admin#unsafe.sh