Every so often, we observe certain spam campaigns that catch our interest. On August 15, we observed a particular spam campaign that caught our attention because it was using “snowshoe” spam techniques combined with PDF exploitation. While neither of these techniques are new, we have seen a growing trend involving snowshoe spam and we wanted to explain why the bad guys seem to be moving in that direction with a real world example.
more here...........http://blogs.cisco.com/security/snowshoe-flurry/
more here...........http://blogs.cisco.com/security/snowshoe-flurry/