The rest of this paper is organized as follows. Section II
presents the necessary background. Our methodology is presented
in Section III while Section IV discusses implementation
details. Section V and VI presents our results and some
interesting findings characterizing the studied malware and
scam landscape. Miscellaneous relevant aspects are discussed
in Section VII and related work is presented in Section VIII.
Finally, we conclude in Section IX.