Spim – What it is and differences with spam

The  term spam  emerged in the early days of the Internet with the aim of coining that annoying practice that filled our inboxes with unwanted email. Although  spam  still exists, technological evolution has given way to new and sophisticated forms of unwanted messaging that adapts to applications such as Facebook, Telegram or WhatsApp. This new type of spam is called spim or spim virus  and it is here to stay.   


What is Spim

The concept of spim is closely linked to message spam, both instant and SMS. While spam is the mass sending of unwanted email, spim tries to emulate this practice through applications such as WhatsApp or Facebook .       

Although spam is very annoying, it is not always malicious in intent. However, spim does have fraudulent purposes , so we must be very attentive to detect it in time and not fall into the trap .     

Spim is an unwanted instant message perpetrated by a cybercriminal whose objective is to collect the victim’s data through malware . Through this virus, we will receive a link from an acquaintance inviting us to click on it. Subsequently, we will be asked for our username and password through a clone Facebook page or the application we are using. At that time, the cybercriminal will have access to our account, devices and contacts.   

Differences between spam and spim

One of the most striking differences between spim and spam is that in spam the sender is a stranger, making it much easier to detect and ignore the fraudulent message . In the spim the message is “camouflaged” in one of our contacts to give it veracity. Additionally, the intent of spam is not always malicious. In fact, the mass sending of advertising through the mail is also called spam .           

On the other hand, spam is more common in email, while spim is typical of instant messaging applications or social networks . In any case, both practices pose a risk to those who receive them, so we must be attentive to any suspicious message.     

How can we avoid spim?

Spim is difficult to avoid, since the messages come from trusted people and the links usually redirect us to “clone pages” of applications such as Facebook or Instagram .  

Cybercriminals often take advantage of vulnerabilities in applications , so it is essential to keep them updated.

On the other hand, you should always look at the source of the link before opening it . If you have already done so, take a look at the address of the page to verify that it is a trusted website before providing your credentials. 

Another of the most striking aspects of spim is that the links do not usually fit into the context of the conversation . Therefore, it is very common to receive sudden messages without having spoken to that person first or using a tone that does not fit with their usual way of speaking.   

Finally, avoid opening conversations from senders other than your contacts , as they could be the gateway to malware of this type.