Security researchers have spotted new variants of the Storm malware within the past few days, suggesting that the botnet's handlers are looking to piece together a new network of infected systems.
Storm first appeared in January 2007, taking its name from the videos of flooding in Europe that were used to lure users into downloading the Trojan installer.
The botnet reigned for nearly two years, and was constantly being re-invented to lure new users with videos based on holidays and current events.
Storm was believed to have been all but eliminated by early 2009, pushed out by newer botnets and increased security efforts. But the new incarnation of the malware carries some key differences to the old infection.
McAfee Labs researcher Toralv Dirro cited work from a group of German researchers which found that the malware had dropped its peer-to-peer communication systems and is using a standard HTTP connection.
"This change basically means that the new botnet is 'just' another botnet among the many thousands active today, with nothing special except the relationship with its notorious predecessor," he wrote in a blog post.
"However, the group running Storm has proven to be very resourceful in the past."
Security experts warn of reformed Storm botnet
By
Shaun Nichols
on Apr 30, 2010 9:24AM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Promoted Content
Have ticket queues become your quiet business risk?
Fabric workshops help partners tap into data services demand growth.
Think Technology Australia deliver massive ROI to a Toyota dealership through SharePoint-powered, automated document management
Promoted Content
Easily turn small, low-tech rooms into future-ready collaboration hubs
Promoted Content
Why Australia’s Industrial Leaders Are Turning to Dynamic Aspect for Dynamics 365 Business Central




