This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Waledac spreading through fake New Year's e-cards

Share this article:

Cybercriminals behind the Waledac botnet have begun using a New Year's-themed campaign to capture more victims, security experts warned on Thursday.

The botnet is spreading spam messages that contain the subject line “Happy New Year 2010”  and provide a link for what the email claims to be a New Year's greeting card, Mikko Hyppönen, chief research officer at anti-virus provider F-Secure, told on Thursday. The campaign began early on Thursday.

If followed, the link directs users to a domain that attempts to exploit known vulnerabilities in Adobe Flash and Reader and Internet Explorer, Hyppönen said. Attackers are banking that users will have at least one of these programs not up to date with the latest patches.

“As we know, more often than not, this will work,” he said.

The payload in this particular campaign is Trojan-Downloader:W32/Agent.MUG, a version of the Waledac Trojan, Hyppönen said. Once the Trojan is installed, the user will become part of the Waledac botnet. Doing so gives attackers full access to a user's machine and the ability to steal data from the PC.

An infected system can also be remotely commanded to download fake anti-virus programs, send spam, or participate in distributed denial-of-service attacks, Randy Abrams, director of technical education at anti-virus vendor ESET, told on Thursday in an email.

Users should be aware of this campaign and other similar ones which may crop up over the next several days, experts said.

“In virtually all cases, the fake e-card is easy to spot if a user realises that legitimate e-cards always have the name of the sender in the subject line," Abrams said. “The fakes may not have a name at all or say something like ‘a friend', ‘a coworker' and so on.”

A version of this article appeared on

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...