Storm Trojan flaunts crazy cat to build out botnet
Meow mix? Nix clicks: Web page with laugh track compromises Windows PCs
Computerworld - After lying low for several weeks, hackers responsible for spreading the Storm Trojan have returned to the attack with e-mail that leads to an exploit-filled Web site and a laughing cat, said researchers today.
Storm -- also known as Nuwar or Peacomm -- is a Trojan horse designed to compromise Windows-powered computers, then add those machines to a growing botnet. Although the size of the botnet Storm has acquired has been disputed, the most conservative estimates put it in the hundreds of thousands.
The malware has been seeded using several attack vectors, but the most common have been e-mail campaigns that contain attachments, or which link to malicious Web sites. Those sites then infect visiting vulnerable PCs using drive-by downloads or by convincing users to click on additional links that then download an executable.
Attacks typically come in waves, researchers have noted, that rise, crest and then subside, while the hackers behind the botnet have become infamous for crafting persuasive messages and tricking users into infecting themselves.
"After a few weeks of low activity from the Storm gang, they...changed the e-mail messages and also the Web site," said Patrik Runald, a researcher at Helsinki, Finland-based F-Secure Corp., on the company's blog.
Starting yesterday, Storm's backers began sending messages that bear the text, "Here is the new Psycho cat card," and that contain a link to a URL. Recipients who click on the link reach a site posing as a humorous greeting, with a Shockwave clip of a laughing kitten, complete with soundtrack, said McAfee Inc.'s Dmitry Gryaznov. The page, however, is loaded with multiple drive-by exploits as well as links to the "SuperLaugh.exe" executable. That file is actually a recent variant of Storm.
"Of course, pretty much wherever you click on the page, you get nothing but Nuwar," said Gryaznov on his company's research blog.
Read more about Security in Computerworld's Security Topic Center.
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- 5 Ways Dropbox for Business Keeps Your Data Protected Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!