Storm Trojan flaunts crazy cat to build out botnet
Meow mix? Nix clicks: Web page with laugh track compromises Windows PCs
Computerworld - After lying low for several weeks, hackers responsible for spreading the Storm Trojan have returned to the attack with e-mail that leads to an exploit-filled Web site and a laughing cat, said researchers today.
Storm -- also known as Nuwar or Peacomm -- is a Trojan horse designed to compromise Windows-powered computers, then add those machines to a growing botnet. Although the size of the botnet Storm has acquired has been disputed, the most conservative estimates put it in the hundreds of thousands.
The malware has been seeded using several attack vectors, but the most common have been e-mail campaigns that contain attachments, or which link to malicious Web sites. Those sites then infect visiting vulnerable PCs using drive-by downloads or by convincing users to click on additional links that then download an executable.
Attacks typically come in waves, researchers have noted, that rise, crest and then subside, while the hackers behind the botnet have become infamous for crafting persuasive messages and tricking users into infecting themselves.
"After a few weeks of low activity from the Storm gang, they...changed the e-mail messages and also the Web site," said Patrik Runald, a researcher at Helsinki, Finland-based F-Secure Corp., on the company's blog.
Starting yesterday, Storm's backers began sending messages that bear the text, "Here is the new Psycho cat card," and that contain a link to a URL. Recipients who click on the link reach a site posing as a humorous greeting, with a Shockwave clip of a laughing kitten, complete with soundtrack, said McAfee Inc.'s Dmitry Gryaznov. The page, however, is loaded with multiple drive-by exploits as well as links to the "SuperLaugh.exe" executable. That file is actually a recent variant of Storm.
"Of course, pretty much wherever you click on the page, you get nothing but Nuwar," said Gryaznov on his company's research blog.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts