Endpoint Protection

A Paper on Waledac 

09-01-2009 03:48 PM

Over the past few weeks a series of blog entries were published about W32.Waledac:

Waledac – an Overview

Waledac, Part 2: Its Bootstraps and Armor

Waledac, Part 3: A Spammer, Downloader, and Infostealer – Among Other Things

If you are interested you can download a Waledac paper, posted here, which presents information on Waledac’s functionalities, possible origins, spam campaigns, and protection mechanisms. There is also more detail on Waledac’s communication protocol and task messages. The paper is based on a blog series and a threat analysis report that was published on the DeepSight portal in June 2009.

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.