Feeds

Storm Worm turns one

Many unhappy returns

Intelligent flash storage arrays

Thursday marked the first anniversary of the infamous Storm Worm. Created by a Russian-based criminal network, the malware rapidly infected millions of PCs in Europe and North America and continues to be a problem.

The Storm Worm malware (more properly known as a Trojan) strain first surfaced on 17 January 2007, in emails attempting to trick users into visiting maliciously-constructed websites under the guise of messages offering information about the storms ravaging Europe at the time.

Over recent months crackers have refined their tactics. Emails punting the malware now contain fake links to YouTube, for example. Hackers have also attempted to trick users into visiting maliciously-constructed websites via login-confirmation spam or bogus electronic greeting card receipts. Most recently Storm Worm lures posed as Valentine's Card greetings.

Since the recent Christmas greeting and Valentine's Card variants, security companies have begun to think that the malware authors behind the Storm Worm are getting ideas for fresh variants from speculative posts from security firms.

The main attack methodology - tricking users into visiting maliciously constructed websites that attempt to load botnet clients onto vulnerable PCs - has remained much the same. The ability of the malware to adapt a variety of social engineering tricks in an attempt to infect gullible users has become one of the hallmarks of its success.

Compromised machines, however they are infected, become zombie clients under the control of hackers. The Storm Worm was the first botnet client to be based on a peer-to-peer (P2P) command and control protocol, an approach that makes networks of compromised PCs far more difficult to shut down. Over the last year, the Storm Worm has infected millions of Windows machines around the world.

Through analysis of the tactics used, net security services firm MessageLabs reckons that the StormWorm gang is a small group of young adults, likely to be in their early 20s, and from Russia. Storm Worm’s closest rival botnet, Warezov, is likely to be Asian in origin.

It is unlikely that the Storm Worm gang is an organised criminal group, MessageLabs thinks. Analysts at the firm reckon it much more likely that the gang is "largely constructed of a loose affiliation of disconnected but highly-specialised individuals and small groups", united by a common purpose of making money from malware.

Compromised machines (proxies) are sent out on the digital underground as resources for hackers to launch denial of service attacks, or more commonly to distribute spam.

Secure Computing, which has been tracking the Storm Worm malware since its inception, reckons an average of 5,500 new PCs are being abused daily as part of the group of botnets created by various versions of the malware. The firm has set up a StormTracker portal as a way of sharing data among researchers and organisations looking to protect themselves and others against the threat posed by the malware. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.