Localized WALEDAC Attacks

Written by: Bernadette Caraig

How does this threat get into users' systems?

This threat arrives via spammed messages that contain a link that when clicked redirected users to a malicious site.

How does this threat affect users?

Downloading the malicious files from the URL results in the installation of a backdoor onto users' systems, which compromises their security and brings about risks of information and identity theft.

How does this threat make money for its perpetrators?

This threat makes money for its perpetrators by stealing information found on users' systems such as user names and passwords, which are common merchandise in the underground market.

Who is at risk?

Users of unprotected systems are at risk of losing pertinent personal information or worse.