Storm worm causes weekend of trouble

Criminal gang behind Storm worm wreaks havoc for computer users over weekend.

Security company F-Secure report says that the gang which launched a computer virus trading on people's interest in the storms that hit Europe last week has issued more malware over the weekend.

First discovered on Friday, Storm Worm was spammed out over the weekend and hit Europe and the east coast of the US particularly hard.

Since then, a new Trojan along with numerous variants have been spammed out in emails that make outrageous claims based on current news trends, such as missiles shooting down satellites, or that Saddam Hussein has been seen alive.

The latest versions use rootkit techniques that hide the virus deep in the system where they can't be accessed by security software without the technology to run the low-level scans needed to detect them.

Researchers at Sunbelt also noted the veracity of the Storm Worm, describing it as 'quite nasty'.

Softscan said that security companies generally coped quite well with the rapid release of new variants, with one issuing updates within 20 minutes. However, even in that vanishingly small window, the company tracked 2,600 mails loaded with the new variant.

'I think it's very easy to become complacent about viruses and worms because there hasn't been many large outbreaks just recently and normally many of the anti-virus vendors are able to create signatures for their databases that generically pick up the current malware and any of the subsequent variants,' said Diego d'Ambra CTO of SoftScan. 'The people behind Storm Worm have now shown us that it's something they are aware of and I think we will start to see more malware like this in the future.'

The rapid infection rate of the worm can be seen through F-Secure's tracking centre.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021