Feeds

Storm worm authors switch tactics

Bogus updates and racy pics fuel botnet

Secure remote control for conventional and virtual desktops

The hackers behind the Storm worm attack are switching tactics.

The malware infected thousands of computers in January by promising recipients information about the storms ravaging Europe at the time in email messages that directed potential marks towards a malware-infested website. Malicious code on the site attempted to download Trojan horse malware onto unpatched Windows boxes that strayed onto the sites. Compromised machines were used to distribute junk mail - the attack was linked to a huge upsurge in spam.

More recently the gang switched tactics, attempting to trick users into visiting maliciously-constructed websites via bogus electronic greeting card receipts. Surfers straying onto these sites last week were offered bogus Microsoft updates. The "updates" - loaded with Trojan code - attempted to trick gullible users into becoming infected even in cases where their machines are fully patched and up to date. Those duped by the ruse became infected with the Zhelatin-gg, a botnet client containing rootkit functionality.

"This operation is apparently the work of the same gang that did the original 'Storm worm' run in January 2007," Finnish antivirus firm F-Secure reports.

Botnet herders refined these tactics over the weekend via emails promising either racy picture or romance to the lovestruck. With Hurricane Dean bearing down on the low-lying Cayman Islands and Mexico after devastating Jamaica overnight its tempting to speculate that the Storm worm authors might come full circle by the end of the week. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.