Waledac bot pitches nearby terrorist bombing to dupe users
Pitch customized for recipient's location for 'more compelling' trickery, says researcher
Computerworld - Hackers trying to trick users into downloading the Waledac Trojan horse are customizing their bait to the recipient's location, upping the social engineering ante yet again, a security researcher said today.
The latest round of spam messages from Waledac's makers trumpets news of a supposed bomb blast, said Paul Royal, principal researcher at Web security company Purewire Inc. The link included in the spam -- which comes armed with subject headings such as "Bomb was blasted in your town" and "At least 18 killed in your city" -- leads to a fake Reuters news service site, and a story that claims local fatalities from a bombing attack.
"Authorities suggested that the explosion was caused by a 'dirty' bomb," one version of the bogus site read. The site then uses the now-standard ruse of asking the user to download and install an update to Adobe System Inc.'s Flash Player to view video. The file is nothing of the sort but is actually the Waledac Trojan horse.
"Within the last 24 to 48 hours, Waledac has switched to a fake Reuters news story," said Royal. In itself, that's nothing new: Attackers have leveraged current events to get users to download malware for years. "What's somewhat novel here is that the Waledac operators have added the notion of locality," he said.
"Either at the malware distribution point or somewhere upstream from the user, they look at the IP address, use that to get your location and then feed that into the news story so it says that the bomb blast was near a market in your city."
When Royal used an IP address in Chile, for example, he was served up with a link to a story that claimed the bombing had taken place in Santiago, that country's largest city and capital. "The content becomes more compelling," Royal said, when it poses as local news.
Waledac has become famous for using the cutting-edge social engineering tactics, one of the reasons why security researchers almost unanimously believe that its makers are from the group that operated the infamous Storm botnet last year.
"Storm's operators always chose to exploit things that were temporally relevant," said Royal. "And Waledac shows the same unique insight into using social engineering and what's current in the news."
Although Waledac has been active for several months, Royal noted that it has yet to build up a botnet that can rival Storm at its peak. "It's nowhere near as big," he said, noting that Purewire had pegged Storm as controlling as many as 400,000 PCs in late 2007. "It's harder to get an accurate number for Waledac," he noted, "but our best guess is that it's in the 25,000-to-50,000 range."
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts