Malware researchers tracking the threat are privately awed by the sheer volume of spam with social engineering lures to malicious executables. “It’s nonstop, never-ending,” said a virus analyst at a major computer security firm.
The attackers have tied the spam lures to global news events, links to YouTube videos and online greeting cards. The sophisticated operation includes the use of fast-flux networks to avoid shutdowns, a rootkit component to hide from anti-virus scanners and a P2P command-and-control structure that makes it near impossible to kill the controlling server.
The Storm Worm attackers have also hacked into legitimate Web sites and used iFrame redirects to send surfers to Web servers hosting malware downloaders.
|Apple Spurs User Outrage Forcing iTunes...||11|
|EVGA Greets GeForce GTX 980 & 970 Launch...||8|
|Confirmed: Microsoft To Acquire...||8|
|Microsoft To Announce $2.5B Minecraft...||8|
|Acer Announces 28-Inch XB280HK Monitor...||7|
|New Radar Gun Technology Will Allow...||6|
|Netropolitan Is Facebook For The Rich,...||6|