Feeds

Anatomy sheds new light on Storm Worm

Unknown DDoS tool, predecessors

Protecting against web application threats using SSL

A deluge of Trojan-laced spam that slyly tricked recipients by promising information about winter storms ravaging Northern Europe last month was even more crafty than we thought.

Among the new revelations: The Storm Worm malware launched DDoS attacks on a host of websites related to spam, antispam and just about anything else that may have piqued the perpetrators' ire, according to Joe Stewart, senior security researcher for SecureWorks. It also appears to be a close descendant of worms that spread in November and December, a connection that few if any have made until now.

Storm Worm captured the grudging admiration of those in the security industry for its uncanny ability to marry technical prowess with social networking. Within days of brutal storms sacking Europe, the email assault began bearing subject lines such as "230 dead as storm batters Europe." Sadly, plenty of recipients fell for the topical come-on. Over the next week, the worm played at least a half dozen variations on a theme, using subjects such as one claiming US Secretary of State Condoleezza Rice kicked German Chancellor Angela Merkel.

It was known to install a root kit that made victims part of a botnet.

Stewart says Storm Worm is a variant of the Win32/Nuwar worm that spread as early as November. Unbeknown to most at the time, Storm Worm also also installed a DDoS attack tool that wreaked havoc on various websites. Among them was spamnation.info, which is dedicated to countering the menace of spam. According to a February 3 posting, the site was shut down for eight days by a DDoS attack suspected to have been carried out by "spammers who were unhappy about the fact that the site publishes information about stock spam" .Other sites that were also targeted by Storm Worm included stockpatrol.com and several sites Stewart guesses were run by rival spammer gangs.

Stewart provides plenty of other details in his anatomy-of-a-worm report. Among other things, the worm downloaded additional payloads using the eDonkey/Overnet P2P protocol and a highly sophisticated series of hash values to keep the download sites from getting shut down ®.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.