iTnews
  • Home
  • News
  • Technology
  • Security

Storm bot's stranglehold slipping: report

By Sue on May 6, 2008 8:57AM
Storm bot's stranglehold slipping: report

The Storm Worm botnet is just a fraction of its original size, but malware remains on the rise, according to one email security firm.

The Storm botnet showed a dramatic decrease while web-based malware increased, the latest monthly MessageLabs Intelligence Report shows.

Partly due to an updated Microsoft Malicious Code Removal Tool that helps detect infection and partly because of efforts to control the command and control systems by various white-hat hackers, Storm is now just five percent of its original size, Matt Sergeant, senior anti-spam technologist at MessageLabs, told SCMagazineUS.com on Monday.

“Its volume is massively down,” Sergeant said. “But of course the owners will be working on that.  They are not going to give up their revenue stream that easily.”

Ken Dunham, director of global response at iSight Partners, a risk analysis firm agreed with MessageLabs' findings.

“Storm was the most well known bot, but things have definitely changed,” Dunham said. “People are monitoring to see who is infected, so it isn't hard to identify all the different hosts and work with that within a network. There is a lot of pressure being put on the Storm Worm botnet.”

On the other hand, Dunham added, the decrease in its size may be because it was broken into smaller parts and is being sold in parcels.

But even as Storm appears to be dying, other types of malware continue to increase. An analysis of web-based malware identified that 36.1 percent of interceptions in April were new, an increase of 23.3 percent since March.

MessageLabs also identified an average of 1,214 new websites per day that harbor malware and other potentially unwanted programs, such as spyware and adware, an increase of 619 per day compared with the previous month.

“There seems to be a large effort currently to use legitimate sources, be it large webmail providers or by cracking into corporate mail servers, to spread spam and malware,” Sergeant said.

“A lot of these emails are variations on advanced fee [Nigerian] frauds. Other organizations have taken Storm's lead and built themselves massive botnets.”

These “other organizations” appear to be criminal networks, Dunham said.

“Botnets used to be child's play," he said, "but today, it is all about criminal motivation. Organized crime rings are doing this for fraud, and they are doing it on a network level so they don't bring attention to themselves.”

While the landscape for botnets is increasingly difficult to pinpoint, Dunham said two other botnets are poised to overtake Storm: Nethell and Srizbi.

See original article on scmagazineus.com
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
botsreportsecurityslippingstormstranglehold

Partner Content

Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Sue
May 6 2008
8:57AM
0 Comments

Related Articles

  • Poor patching creates easy zero-day vulnerability reuse
  • Atlassian patches Jira server plugin to fix vulnerability
  • Monash University opens public bug bounty
  • Sophisticated ZuoRAT attack targets home workers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

PayTo rollout kicks off

PayTo rollout kicks off

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

TPG Telecom puts fresh targets on IT simplification

TPG Telecom puts fresh targets on IT simplification

Digital Nation

The security threat of quantum computing
The security threat of quantum computing
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.