Storm Trojan flaunts crazy cat to build out botnet
Meow mix? Nix clicks: Web page with laugh track compromises Windows PCs
Computerworld - After lying low for several weeks, hackers responsible for spreading the Storm Trojan have returned to the attack with e-mail that leads to an exploit-filled Web site and a laughing cat, said researchers today.
Storm -- also known as Nuwar or Peacomm -- is a Trojan horse designed to compromise Windows-powered computers, then add those machines to a growing botnet. Although the size of the botnet Storm has acquired has been disputed, the most conservative estimates put it in the hundreds of thousands.
The malware has been seeded using several attack vectors, but the most common have been e-mail campaigns that contain attachments, or which link to malicious Web sites. Those sites then infect visiting vulnerable PCs using drive-by downloads or by convincing users to click on additional links that then download an executable.
Attacks typically come in waves, researchers have noted, that rise, crest and then subside, while the hackers behind the botnet have become infamous for crafting persuasive messages and tricking users into infecting themselves.
"After a few weeks of low activity from the Storm gang, they...changed the e-mail messages and also the Web site," said Patrik Runald, a researcher at Helsinki, Finland-based F-Secure Corp., on the company's blog.
Starting yesterday, Storm's backers began sending messages that bear the text, "Here is the new Psycho cat card," and that contain a link to a URL. Recipients who click on the link reach a site posing as a humorous greeting, with a Shockwave clip of a laughing kitten, complete with soundtrack, said McAfee Inc.'s Dmitry Gryaznov. The page, however, is loaded with multiple drive-by exploits as well as links to the "SuperLaugh.exe" executable. That file is actually a recent variant of Storm.
"Of course, pretty much wherever you click on the page, you get nothing but Nuwar," said Gryaznov on his company's research blog.
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!