Storm malware shapes up as worst 'weather' in years
Symantec: Web hasn't seen an infection like this since 2005's Sober.O
IDG News Service - Malicious software that was sent out in millions of spam messages over the weekend has now infected about 300,000 computers, making it the worst malware outbreak since 2005, Symantec Corp. said Monday.
The so calledStorm Worm e-mail messages first started appearing last Wednesday, advertising attached news reports on topics like "230 Dead as storm batters Europe," or "U.S. Secretary of Sate Condoleeza Rice has kicked German Chancellor."
The attachments have names such as "Full Story.exe" or "Full Video.exe." Once they are launched, these files install malicious software that then waits to receive further instructions over the Internet.
The malware is not actually a worm, however, and infected PCs do not immediately start spreading the software to other computers. Instead, Storm has been spreading more rapidly over the past few days as its creators have pumped out more and more malicious e-mail messages.
"Over the weekend, it really kicked into high gear," said Patrick Martin, senior product manager with Symantec Security Response.
The last time malicious software spread this quickly was in May 2005, when the Sober.O mass-mailing worm affected a similar number of systems, Martin said.
The latest versions of the worm include similarly provocative news headlines and malicious attachments, but the criminals have added a twist over the past few days: the text of the e-mail messages now contains glowing reviews of penny stocks, apparently designed to fuel "pump and dump" stock scams.
Some of the e-mail messages have also been changed to prey on the romantic, security vendor F-Secure Corp. warned. Recent versions of these Trojan e-mails have contained subject lines such as "A Bouquet of Love," "A Day in Bed Coupon," or "A Monkey Rose for You."
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!