Researchers from major security firms have uncovered thousands of spam emails spreading the Trojan in the days leading up to 14 February.
The worm has been spreading since January in the form of email greeting cards with subjects as 'You Stay in My Heart' and 'Thinking of U All Day'.
Users are taken to a fake e-card site and asked to download an application called 'valentine.exe'. The executable file is a Trojan which will add the user's computer to the huge Storm botnet.
The botnet has become one of the most formidable security threats on the internet, and researchers suspect that Storm's creators are now renting out the infected machines.
Storm has used fake holiday email greeting cards as a way for spreading the infection since it emerged in early 2007.
Symantec researcher Silas Barnes noted in a company blog that Storm is hardly the first security threat to pose as a holiday greeting.
"Holiday theme-based threats have enjoyed great success since at least 2000, and every year attackers are successful in compromising machines via constructed email messages," Barnes wrote.
"While the messages change from year to year, the mitigation strategy remains the same, which includes keeping antivirus signatures up-to-date and treating all emails carefully."
Storm clouds Valentine's Day inboxes
By
Shaun Nichols
on Feb 15, 2008 7:18AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program
Ingram Micro Ushers in the Age of Ultra

Channel can help lead customers to boosting workplace wellbeing with professional headsets

Build cybersecurity capability with award winning Fortinet training from Ingram Micro
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report