Record-breaking 'Storm' linked to spam surge
Biggest, baddest e-mail malware ever, says researcher
Computerworld - Storm, the Trojan horse that collects PCs into hacker-controlled botnets, roared back into life last month in several waves, security researchers said Monday, and has blown by 2005's Sober to become the most prolific e-mail-borne malware ever.
"This is the biggest since Sober in mid-to-late 2005," said Sam Masiello, director of threat research at MX Logic Inc., referring to a long-lasting worm whose variants struck repeatedly in the second half of 2005, often in extremely high numbers. In November 2006, for instance, e-mail filtering companies reported malware-laden e-mail counts spiking 1,500% in a week, and said they were intercepting four times the usual number of infected messages.
According to MX Logic, Storm -- a bot Trojan that collects compromised computers into large networks of ready-to-use PCs -- has broken Sober's records. Thanks to Storm, the Englewood, Colo.-based managed e-mail security vendor tracked a July jump in malicious e-mail of 1,700% over June.
Storm, however, is much more malevolent than Sober ever dreamed. "Not only is it designed to propagate more copies of Storm, but it releases huge quantities of spam," said Masiello.
Security analysts, Wood and Masiello among them, have been drawing a line between Storm's success and spam outbursts of July and August, including one that dropped impressive quantities of "pump-and-dump" stock scam mail in mailboxes worldwide. "Certain Trojans are specifically written not only to make their own botnet larger, but to propagate specific types of spam," Masiello said.
Other researchers are also convinced that Storm is directly related to the jump in spam users saw in July, and are still seeing now. "Looking at the network traffic overall, where [malware] is being hosted, I think it's almost certainly a cause and effect," said Paul Wood, an analyst at MessageLabs Ltd. "The Storm botnet is one of the most successful we've seen in recent times. And now that's paying off, from [the hackers'] perspective."
Storm started to gather steam near the end of June, when several spasms of mail posing as greeting cards reached users, and reach critical mass just before July 4, when holiday subject lines tempted even larger numbers of users to click through. "Storm's using more of a 'pull' than a 'push' model now," said Masiello. Earlier Storm bot-building campaigns had come with attachments that when run hijacked the targeted PC. More recent attacks simply offer up a link in the e-mail; when users click on the link, code on the ensuing site -- actually, often several exploits that try several vulnerabilities until one works -- snatches the PC.
For example, Symantec Corp. researchers said on Saturday that their honeypots had snared several examples of mail that tried to dupe users into visiting sites where Mpack, a multiple-exploit hacker kit, awaited. When successful, Mpack then installed Storm, which goes by Peacomm in Symantec's nomenclature. "While Mpack itself is not new, the Peacomm/Mpack link is," said Symantec analyst Anthony Roe in an alert sent to customers of the company's DeepSight threat network. "This is a new propagation vector for the Peacomm Trojan."
But although it had traced a new variation on the Storm saga, Symantec wasn't buying the bot-to-spam link. "Internet news sites are discussing unsubstantiated reports that Trojan.Peacomm [Storm] infections have resulted in a massive attacker controlled P2P bot network that is accountable for the huge surge in penny stock pumping spam observed lately," said Roe. "This appears to be mostly conjecture.
Masiello was having none of that. "There's definitely a correlation between Storm and recent spam attacks," he said.
In fact, Masiello argued that the large Storm-recruited botnets means the volume of spam, and its percentage of all e-mail, will continue to climb between now and the end of the year. "Spam is generally cyclical," with the peak in the last quarter. "They're setting up the infrastructure now" for that late-year push.
Read more about Security in Computerworld's Security Topic Center.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!