This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Waledac spreading through fake New Year's e-cards

Share this article:

Cybercriminals behind the Waledac botnet have begun using a New Year's-themed campaign to capture more victims, security experts warned on Thursday.

The botnet is spreading spam messages that contain the subject line “Happy New Year 2010”  and provide a link for what the email claims to be a New Year's greeting card, Mikko Hyppönen, chief research officer at anti-virus provider F-Secure, told on Thursday. The campaign began early on Thursday.

If followed, the link directs users to a domain that attempts to exploit known vulnerabilities in Adobe Flash and Reader and Internet Explorer, Hyppönen said. Attackers are banking that users will have at least one of these programs not up to date with the latest patches.

“As we know, more often than not, this will work,” he said.

The payload in this particular campaign is Trojan-Downloader:W32/Agent.MUG, a version of the Waledac Trojan, Hyppönen said. Once the Trojan is installed, the user will become part of the Waledac botnet. Doing so gives attackers full access to a user's machine and the ability to steal data from the PC.

An infected system can also be remotely commanded to download fake anti-virus programs, send spam, or participate in distributed denial-of-service attacks, Randy Abrams, director of technical education at anti-virus vendor ESET, told on Thursday in an email.

Users should be aware of this campaign and other similar ones which may crop up over the next several days, experts said.

“In virtually all cases, the fake e-card is easy to spot if a user realises that legitimate e-cards always have the name of the sender in the subject line," Abrams said. “The fakes may not have a name at all or say something like ‘a friend', ‘a coworker' and so on.”

A version of this article appeared on

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Queen's website hosts controversial tracking technique

Queen's website hosts controversial tracking technique

Advertising tracking called 'canvas fingerprinting' is used on many websites and identifies unique individuals and their browsing habits and works surreptitiously.

Could MH17 sanctions push Russia to cyber warfare?

Could MH17 sanctions push Russia to cyber warfare?

A leading cyber security academic has warned the US and European governments that tougher sanctions on Russia relating to the MH17 airplane crash could result in the start of cyber ...

Snowden, Ellsberg ask hackers to help obscure whistleblower activity

Snowden, Ellsberg ask hackers to help obscure whistleblower ...

Crowds of people came out to see Daniel Ellsberg chat with Edward Snowden at HOPE X conference.