Skip the navigation

'Storm Trojan' ignites worm war

It's spreading via IM, attacking rival malware

February 12, 2007 12:00 PM ET

Computerworld - The Trojan horse that pumped up spam volumes in January is at it again, researchers said today, and is now spreading over instant messaging and engaging in attacks on rival malware.

Symantec Corp. researchers said that the "Storm Trojan," a.k.a. "Peacomm," is now spreading via AOL Instant Messenger (AIM), Google Talk and Yahoo Messenger.

An alert to some Symantec customers pegged the new infection vector as "insidious" because the message -- such as the cryptic "LOL ;)" -- and the included URL can be dynamically updated by the attacker. Even worse, according to Alfred Huger, senior director of Symantec's security response team, "it injects a message and URL only into already open windows. It's not just some random message that pops up, but it appears only to people [you are] already talking to. That makes the approach very effective."

Moreover, the server from which the malware is downloaded to the victim's PC can be quickly changed by the attacker using the Trojan's peer-to-peer (P2P) control channel. "Everything can constantly change," said Huger.

The newest attack by Peacomm follows an earlier campaign in January, when the Trojan got its nickname from e-mail subject headings that touted news of massive storms throughout Europe.

But one researcher traced the Trojan further back than that. According to an analysis by Joe Stewart, a SecureWorks senior security researcher, Peacomm is actually a spinoff of last year's "Nuwar" worm. "It's pretty much the same code," said Stewart.

Both Stewart and Huger also noted that the Trojan has been behind several recent distributed denial-of-service (DDoS) attacks against antispam Web sites, as well as servers supporting rival malware.

Among the multiple second-stage components downloaded to Windows PCs compromised by Peacomm, said Stewart, is a DDoS module that can be enabled at will by the attacker and aimed at any site. The January target list included spamnation.info, which was knocked offline for eight days starting Jan. 12. The better-known spamhaus.org was an indirect victim, too.

Systems hijacked by Peacomm have also conducted DDoS attacks against at least five domains used by the creators of the noted Warezov (or Stration) worm. After a busy September and October, Warezov was credited by some analysts as the genesis of 2006's massive fourth-quarter spike in spam volume.

"It seems that this spam group is prone to attack anyone that interferes with its business model, be it antispammer or spammer," said Stewart.

Symantec's Huger agreed: "Malware groups compete with each other [over compromised systems] as much as for uninfected machines." In fact, according to Symantec's data, the bulk of DDoS activity is due to hacker internecine warfare as one group tries to blunt another's attempt to corral large numbers of PCs in botnets.



Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!