Feeds

Storm Worm turns one

Many unhappy returns

SANS - Survey on application security programs

Thursday marked the first anniversary of the infamous Storm Worm. Created by a Russian-based criminal network, the malware rapidly infected millions of PCs in Europe and North America and continues to be a problem.

The Storm Worm malware (more properly known as a Trojan) strain first surfaced on 17 January 2007, in emails attempting to trick users into visiting maliciously-constructed websites under the guise of messages offering information about the storms ravaging Europe at the time.

Over recent months crackers have refined their tactics. Emails punting the malware now contain fake links to YouTube, for example. Hackers have also attempted to trick users into visiting maliciously-constructed websites via login-confirmation spam or bogus electronic greeting card receipts. Most recently Storm Worm lures posed as Valentine's Card greetings.

Since the recent Christmas greeting and Valentine's Card variants, security companies have begun to think that the malware authors behind the Storm Worm are getting ideas for fresh variants from speculative posts from security firms.

The main attack methodology - tricking users into visiting maliciously constructed websites that attempt to load botnet clients onto vulnerable PCs - has remained much the same. The ability of the malware to adapt a variety of social engineering tricks in an attempt to infect gullible users has become one of the hallmarks of its success.

Compromised machines, however they are infected, become zombie clients under the control of hackers. The Storm Worm was the first botnet client to be based on a peer-to-peer (P2P) command and control protocol, an approach that makes networks of compromised PCs far more difficult to shut down. Over the last year, the Storm Worm has infected millions of Windows machines around the world.

Through analysis of the tactics used, net security services firm MessageLabs reckons that the StormWorm gang is a small group of young adults, likely to be in their early 20s, and from Russia. Storm Worm’s closest rival botnet, Warezov, is likely to be Asian in origin.

It is unlikely that the Storm Worm gang is an organised criminal group, MessageLabs thinks. Analysts at the firm reckon it much more likely that the gang is "largely constructed of a loose affiliation of disconnected but highly-specialised individuals and small groups", united by a common purpose of making money from malware.

Compromised machines (proxies) are sent out on the digital underground as resources for hackers to launch denial of service attacks, or more commonly to distribute spam.

Secure Computing, which has been tracking the Storm Worm malware since its inception, reckons an average of 5,500 new PCs are being abused daily as part of the group of botnets created by various versions of the malware. The firm has set up a StormTracker portal as a way of sharing data among researchers and organisations looking to protect themselves and others against the threat posed by the malware. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.