Feeds

Dodgy drug sales underpin Storm worm

The bitterest pill

Top three mobile application threats

Illegal pharmaceutical supply chain outfits have become the main customers of botnet farmers. Spam-pushing botnets, such as that established by the Storm worm, are raking it in advertising dodgy drug websites, according to a study by security appliance firm IronPort.

Four out of five junk emails distributed through the Storm botnet advertise online pharmacy brands. The storm botnet has become a full-service ecommerce operation with a complex supply chain, according to IronPort's 2008 Internet Malware Trends: Storm and the Future of Social Engineering.

Spam templates, website designs, credit card processing, product shipment and even customer support are being provided by the Russian cybercrooks behind the Storm worm, according to IronPort, the spam filtering appliance division of networking giant Cisco. Malware authors recruit botnet spamming partners to promote illegal pharmacy websites, receiving commissions of as much as 40 per cent on the resulting sales.

The prescription drugs on offer were sent to people who were not examined by a doctor first, risking their health on dodgy male potency drugs and the like. IronPort made a number of purchases of spamvertised drugs. Subsequent pharmacological testing found that two-thirds of the shipments failed to include the correct dosage of an active ingredient while the rest were sugar pills (placebos).

Smoking gun

IronPort's study fills in the detail about the relationship between botnet masters and penis pill spammers, a business it reckons generates tens of millions a year. "Our research has revealed a smoking gun that shows that Storm and other botnet spam generates commissionable orders, which are then fulfilled by the supply chains, generating revenue in excess of $150m per year." said Patrick Peterson, vice president of technology at IronPort.

The Storm worm (more accurately called a Trojan) turns over control of infected PCs to botmasters. Either social engineering trickery or web-based exploits are used to load up malware onto victimised PCs. IronPort reckons a total of 40 million computers have been infected by Storm in the period between January 2007 and February 2008. The actual number of infected machines at any one time is, of course, much lower than this.

Storm was considered to account for one in five spam messages at its peak of 1.4 million compromised PCs in July 2007, though the number infected by Storm has dropped off since then. Storm now represents only a "tiny sliver" of the spam deluge, estimated by IronPort to rack up to 186 billion messages a day. Despite this ratcheting down in activity new variants of Storm continue to appear. Other botnet agents - such as Bobax, Kraken and Srizbi - have emerged to eclipse Storm.

Combat fraud and increase customer satisfaction

Next page: Spam 2.0

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Burnt out on patches this month? Oracle's got 104 MORE fixes for you
Mass patch for issues across its software catalog
Reddit users discover iOS malware threat
'Unflod Baby Panda' looks to snatch Apple IDs
Oracle working on at least 13 Heartbleed fixes
Big Red's cloud is safe and Oracle Linux 6 has been patched, but Java has some issues
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.