• Home
  • About
  • Contact Me

IT Managers Inbox

Resources for IT Managers

  • All Topics
    • Productivity Tips
    • IT Security
    • IT Operations
    • Help Desk
    • Management
    • Leadership
    • Project Management
    • IT Service Management
    • Career and Training
    • Featured Posts
  • Management
  • Leadership
  • Project Management
  • IT Service Management
  • Career and Training

Beware of Valentines Day Waledac Trojan Laced Emails

By Sam Grier

valentineThis Valentines Day you could be left with wonderful memories and a hard to remove Trojan on your computer. Many anti-virus vendors are issuing warnings about a new malware distribution scheme that targets those celebrating Valentine’s Day.

It is the Win32/Waledac worm in a new form being distributed via spammed web pages that prompts users to select a cute Valentine’s heart. In doing so they download the infectious worm.

Many claim that Win32/Waledac is the latest creation of the group that created the Blackberry Storm attack. The group picks holidays and popular events as a method of tricking unsuspecting victims into downloading the Trojan package.

It may come in the form of an email link to what appears to be a legitimate Valentine’s Day e-card. Users are enticed to click on the link which will then take the to a web page. The web page displays several heart shaped icons with a message such as “Guess which one is for you” to entice the user to click one of the icons. If they do it download an executable file which contains the Trojan. The file size is almost always around 390 kb.

CA has issued a warning on their web site about the possible Trojan attack.

Once a computer is infected with the Trojan, it can use the machine as a spam bot while gathering information about the host system and sending the data to accomplice Web servers. Currently Waledac-related Web sites distribute trojan executables with filenames such as love.exe; onlyyou.exe; you.exe; youandme.exe; and meandyou.exe, but there could be new filenames that surface at any time.

“This threat is to be expected with any card-sending type of holiday, but there often is a new twist each year on delivery,” said Brian Grayek, vice president of product management for CA’s Internet Security Business Unit. “With a combination of awareness and ensuring your security software is current, individuals can be safe. Knowing about the threat early—before you find the email in your inbox or get the alert from your IT department—helps ensure individuals don’t open the email and click on links that launch the malware.”

CA’s web site reveals that the e-card scam web sites already affiliated with the Win32/Waledac Trojan have updated their content with a Valentine theme.

waledacg_code

Web sites are distributing the Trojan executables with the following filenames:

waledacg_icons

To stay safe online, CA researchers urge users to make sure they:

  • Exercise caution when downloading and running unknown executable files, and if in doubt, don’t.
  • Update their anti-virus software to the latest signatures.
  • Update their Internet browser to the most current version.
  • Schedule automatic Microsoft Windows updates if using the Windows operating system.

Please visit the CA Security Advisor blog for CA’s Waledac Valentine’s Day post and updates on this threat and others that are discovered.

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email
  • More
  • Pinterest
  • Tumblr
  • Print
  • Reddit
  • Pocket
  • Instapaper

Related That May Interest You

Filed Under: IT Security Tagged With: Email, IT Security

Popular Articles

  • 13 Sites to Download Free eBooks
  • 10 Certifications to Improve Your IT Career
  • How To Deal With Low Morale in The Workplace
  • 5 Ways to Stay Positive in Negative Situations
  • How Passion For Your Job Can Lead To Success
  • How To Work Under Pressure
  • How To Write IT Technical Documentation
  • How To Convert An Email Into An Outlook Task
  • How to Plan a 5S System Launch
  • A 5S Office System - Part 1 Planning
  • Leadership Skills – The Top 5 Skills Needed For IT Leadership Roles
  • 5S System Step 1 - The Sort Step

Latest Tweets

  • Agile project management: A comprehensive guide | CIO https://t.co/lNOtb5MYKB March 2, 2018 5:05 pm
  • The Skills Companies Need Most in 2018 – And The Courses to Get Them - LinkedIn https://t.co/l8fWcK2BvD January 28, 2018 4:45 pm
  • What You Need to Know About Interviewing in 2018 | Official LinkedIn Blog https://t.co/m1zGkCLgpo January 28, 2018 2:05 pm
  • 50 best small companies to work for of 2017, according to employees - Business Insider https://t.co/DeDU2AAb9t December 4, 2017 5:01 pm
  • 2017’s Best & Worst Places to Start a Career #Career https://t.co/9VLvFI5JIu October 21, 2017 7:15 pm
  • Which Is More Important: Faster RAM or More RAM? https://t.co/hPzgQlw1yd September 9, 2017 1:05 pm
  • Leadership training: 10 online resources for developing leadership skills | CIO https://t.co/NeGCSlTyx8 September 5, 2017 3:55 pm
  • If your Wi-Fi router is on this list it might be vulnerable to hacking tools. https://t.co/DCGjoqTXmD June 17, 2017 3:50 pm
  • OneDrive Files On-Demand now available for Windows Insiders https://t.co/l1wNO24Xsp June 17, 2017 12:45 pm
  • Win7 Monthly Rollup KB 4022719 triggers printing problems in Internet Explorer @ AskWoody https://t.co/DdB74SBCmL June 16, 2017 1:00 pm
  • Follow ITManagersInbox On Twitter
IT Managers Inbox Runs On The Magazine Theme

© Copyright 2008-2018 IT Managers Inbox · All Rights Reserved

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.