The Storm botnet is finally dead – but what's next?
The botnet which wrecked havoc in early 2007 is dead, but it looks like it has been replaced by something stronger.
The Storm botnet, which emerged in 2007 as one of the most disruptive pieces of malware, has faded away to nothing.
According to vendor Marshal, the spam coming from the botnet had been dwindling for months, finally stopping altogether this September.
The Storm botnet first really hit the headlines in January 2007, when it propagated to hit computer users in the UK, US and mainland Europe. Industry estimates for the number of computers infected at its peak ranged widely, but it was thought to be in between 500,000 and one million.
One weekend that January, it was particularly virulent as Storm embarked on unprecedented spamming campaigns for the time.
Between January and September 2007, the Storm tempest failed to die down, as it began to reinvent itself in different guises, a template for other spammers to develop their own botnets.
"Storm was one of the first botnets to use these tactics on a mass scale. It became the most successful botnet of its type and established the basic template for developing a spam empire that other botnets have since copied," said Phil Hay, lead threat analyst for Marshal TRACE.
He added: "They also led the way in using self-perpetuating malicious spam to grow the botnet. They utilised every social engineering trick and invented quite a few of their own."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The death knell for Storm really came in September 2007 when Microsoft started targeting Storm with its Malicious Software Removal Tool. In May 2008, Marshal said that Srizbi had overtaken Storm as the dominant spam botnet.
Marshal said that although Microsoft made the major contribution to the downfall of Storm, no one precisely knows what has happened to it - although some have suggested it has morphed into another botnet to produce spam.
Hay suggested that Storm was simply made obsolete in the face of more detection-resistant malware: "A distinct possibility is that the creators of Storm have abandoned it in favour of a newer botnet that they have created.
"If they have, it is possibly one of the top spam botnets that we continue to track. It seems unlikely that Storm's creators simply gave up and went home."
-
HPE's new Cray system is a pocket powerhouseNews Hewlett Packard Enterprise (HPE) had unveiled new HPC storage, liquid cooling, and supercomputing offerings ahead of SC25
-
High performance and long battery life: How Dell AI PCs offer the best of both worldsUnlocking the true potential of on-device AI requires a perfect balance between software and hardware
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up stingNews Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
-
Horabot campaign targeted businesses for more than two years before finally being discoveredNews The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
-
Brand-new Emotet campaign socially engineers its way from detectionNews This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomwareNews The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
-
Beating the bad bots: Six ways to identify and block spam trafficIn-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against RussiaNews The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
-
Microsoft's secure VBA macro rules already being bypassed by hackersNews Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
-
Emotet infrastructure has almost doubled since resurgence was confirmedNews Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation