Security researchers have spotted new variants of the Storm malware within the past few days, suggesting that the botnet's handlers are looking to piece together a new network of infected systems.
Storm first appeared in January 2007, taking its name from the videos of flooding in Europe that were used to lure users into downloading the Trojan installer.
The botnet reigned for nearly two years, and was constantly being re-invented to lure new users with videos based on holidays and current events.
Storm was believed to have been all but eliminated by early 2009, pushed out by newer botnets and increased security efforts. But the new incarnation of the malware carries some key differences to the old infection.
McAfee Labs researcher Toralv Dirro cited work from a group of German researchers which found that the malware had dropped its peer-to-peer communication systems and is using a standard HTTP connection.
"This change basically means that the new botnet is 'just' another botnet among the many thousands active today, with nothing special except the relationship with its notorious predecessor," he wrote in a blog post.
"However, the group running Storm has proven to be very resourceful in the past."
Security experts warn of reformed Storm botnet
By
Shaun Nichols
on Apr 30, 2010 9:24AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Channel can help lead customers to boosting workplace wellbeing with professional headsets

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Kaseya Dattocon APAC 2024 is Back
Ingram Micro Ushers in the Age of Ultra
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report