Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Storm tracker keeps watch on worm progress.

Secure Computing Corporation : 18 January, 2008  (Technical Article)
Detailed information kept up to date by Secure Computing regarding the distribution and spread of the Storm worm.
This week sees the first year anniversary of the Storm worm. Created by a Russian-based criminal network, over twelve months it rapidly infected millions of PC's in Europe and North America - its ability to change and morph as one of the hallmarks of it's success.

Secure Computing has been tracking the Storm worm virus since its inception, and today launches StormTracker on the TrustedSource.org research portal.

StormTracker has revealed an average of 5,500 new PC's are being used daily as part of Storm's malware web hosting network. StormTracker enables information to be shared amongst researchers and organisations looking to protect themselves and others against this insidious threat.

Dmitri Alperovitch, Principal Research Scientist at Secure Computing can share with you how many PC's are now part of this malware web-hosting network, what parts of the world are hosting them, key characteristics that make Storm unique and different from other malware, anniversary stories, and information about the future of the Storm botnet.

The Storm Worm takes its name from its initial email campaign that referenced the deadly winter storm battering Europe at that time, represented a paradigm shift in malware design. It was the first large scale virus to be based on a peer-to-peer (P2P) command and control protocol, which allowed its bot network to be nearly invulnerable to shutdown attempts. It was also the first to demonstrate the convergence of the web and messaging communication spectrums in the malware space by utilizing both email and web-based infection vectors. Over the last year, the Storm worm proceeded to infect millions of machines around the world and cunningly change its message to reference newsmakers, news headlines and popular events and holidays (Saddam Hussein, Fidel Castro, start of NFL season, Christmas and New Years, etc).
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo