malwarebytes banner


Navigate through the clutter of unwanted digital noise in our “Spam” category at Spam can range from merely annoying to seriously harmful, involving unsolicited emails, SMS messages, and social media posts that can lead to phishing attacks, malware infections, and privacy breaches. Our expert articles offer strategies for identifying, managing, and preventing spam across various platforms. Learn how to effectively use filters, recognize phishing attempts, and safeguard your digital identity. Whether you’re an individual looking to protect your personal inbox or a business aiming to secure communications, find all the resources you need to keep spam at bay and maintain a clean digital environment.

How to stop Bank Confirmation e-mail spam

Bank Confirmation email spam is a type of phishing scam where cybercriminals send fraudulent emails that appear to be from a bank or financial institution. These emails often claim that a payment has been made or that confirmation is required for a transaction, and they prompt the recipient to click on a link or open an attachment. The goal is to deceive recipients into disclosing their account login credentials or to infect their computers with malware. Bank confirmation email spam is a serious threat that can lead to identity theft, financial loss, and malware infection. By staying vigilant, using protective measures, and knowing how to respond to a suspected scam, individuals and organizations can significantly reduce their risk of falling victim to these cyber attacks.

How to stop “Have You Heard About Pegasus?” e-mail spam

Have You Heard About Pegasus? email scam is a type of sextortion and phishing campaign that exploits the notoriety of the Pegasus spyware to intimidate recipients. The scam emails falsely claim that the sender has compromised the recipient's device with Pegasus spyware and has obtained sensitive or compromising information. The scammer then demands a ransom, typically in Bitcoin, to prevent the release of this information. Spam campaigns, also known as malspam, are a common method used by cybercriminals to distribute malware. These campaigns send out emails en masse, which may contain malicious attachments or links. When a recipient clicks on these links or opens the attachments, their device can become infected with malware. The types of malicious files used in these campaigns can vary, including documents, executables, archives, JavaScript files, and more.

How to stop “MINISTÉRIO PUBLICO PORTUGAL” e-mail spam

MINISTÉRIO PUBLICO PORTUGAL email spam is a malicious spam campaign that falsely claims to be from the Public Prosecution Service of Portugal, notifying recipients that they are under investigation for tax fraud. This email is not associated with any legitimate body of Portugal's Judiciary. The email is a form of malspam, a malicious spam that carries threats such as trojans, password-stealing viruses, banking malware, and spyware. Spam campaigns infect computers by tricking users into opening malicious files or links. These files or links are often disguised as "official", "important", or "urgent" to deceive users into trusting them. For instance, the "MINISTÉRIO PUBLICO PORTUGAL" email scam lures recipients into opening a virulent file promoted through it. If a user opens the attachment, malicious macros or JavaScript can download malware into the system.

How to stop “Central Loteria Nacional Europa” e-mail spam

The Central Loteria Nacional Europa email scam is a fraudulent scheme where the recipient is informed of an unclaimed prize money, attempting to deceive the recipient into interacting with the email, often through opening an attached file or clicking a link. This type of scam is a form of phishing, a common tactic employed by cybercriminals to trick individuals into revealing sensitive information or downloading malicious software. Spam campaigns typically infect computers by enticing the recipient to interact with the email. This interaction can take the form of clicking on a link or opening an attachment embedded in the email. These links or attachments often contain malicious software, or malware, which begins to download onto the recipient's computer upon interaction. The malware can take various forms, including ransomware, which locks the user out of their system until a ransom is paid, or a botnet, which uses the infected computer to spread the spam email further. The malware can also provide the attacker with remote access to the victim's device, steal personal data, or enlist the victim's system into a botnet.

How to stop “Hello My Perverted Friend” e-mail spam

Hello My Perverted Friend email scam is a form of sextortion, a type of cybercrime where the perpetrator threatens to release compromising or intimate content of the victim unless a ransom is paid. This scam involves an email where the sender claims to be a hacker who has gained access to the victim's device, including their browser history and webcam footage, and demands a ransom, typically in Bitcoin, to prevent the release of explicit videos. Spam campaigns like "Hello My Perverted Friend" use various techniques to reach and convince their targets. They often employ fear and urgency, using intimidating language to provoke panic and prompt quick payment. The emails may assert control over the victim's devices and discourage contacting authorities or attempting to reset systems. Spammers harvest target email addresses from web pages, forums, wikis, and other online platforms. These lists are then used to send out mass emails in hopes that some recipients will fall for the scam. To evade spam filters, scammers constantly adapt their messaging, using different subject lines and email content.

How to stop “We noticed a login from a device you don’t usually use”...

We noticed a login from a device you don't usually use is a common type of phishing email scam. The email typically appears to come from a reputable company, such as a social media platform or an email service provider, and informs the recipient that there has been a suspicious login to their account from an unfamiliar device. The goal of the scam is to trick the recipient into revealing their login credentials or other sensitive information. The email typically provides details of the alleged sign-in, such as the device and location used, and prompts the user to secure their account if the activity was not initiated by them. The link provided for securing the account leads to a fraudulent website designed to capture the user's login details. Once scammers obtain these login credentials, they can hijack the email account to launch further phishing attacks on the victim's contacts. The stolen credentials can also be used for identity theft or unauthorized access to other online accounts associated with the victim. In some cases, stolen email accounts can be sold on the dark web, contributing to a broader black market for compromised credentials.


ACH-Electronic Funds Transfer (EFT) email spam is a type of scam that targets the Automated Clearing House (ACH) network, which is responsible for processing electronic fund transfers in the United States. These scams typically involve phishing emails that appear to be from a legitimate source, such as a bank or financial institution, and contain malicious links or attachments. When a victim clicks on the link or opens the attachment, their computer may become infected with malware, which can lead to unauthorized access to their bank account and the theft of funds. Spam campaigns can infect computers through various methods, including deceptive emails, rogue online pop-up ads, search engine poisoning techniques, and misspelled domains. In many cases, the emails contain malicious attachments or links that, when opened or clicked, install malware on the victim's computer. This malware can then be used to steal sensitive information, such as login credentials for online banking or email accounts, and facilitate further attacks, such as identity theft or financial fraud.

How to stop “Funds For Transfer” e-mail spam

Funds For Transfer email scams are a type of phishing scam that aims to deceive recipients into sending money or providing sensitive information to scammers. These scams often involve a seemingly legitimate email that claims the recipient is entitled to a large sum of money, usually in the form of an inheritance, lottery winnings, or a contract payment. The scammers then attempt to extract money or personal information from the victim, often by requesting payment for fake administration fees or claiming that an advance payment is required to receive the full amount. Spam campaigns can infect computers through various methods, including: malicious attachments, malicious links, social engineering.