Storm Botnet

Status
Not open for further replies.
Joined
May 27, 2002
Messages
10,990
Location
Canberra ACT Australia
The Storm worm botnet has grown so massive and far-reaching that it easily overpowers the world's top supercomputers.

That's the latest word from security researchers who are tracking the burgeoning network of Microsoft Windows machines that have been compromised by the virulent Storm worm, which has pounded the Internet non-stop for the past three months.

Despite the wide ranging estimates as to the size of the botnet, researchers tend to agree that it's one of the largest zombie grids they've ever seen -- one capable of doing great damage.

"In terms of power, the botnet utterly blows the supercomputers away," said Matt Sergeant, chief anti-spam technologist with MessageLabs, in an interview. "If you add up all 500 of the top supercomputers, it blows them all away with just 2 million of its machines. It's very frightening that criminals have access to that much computing power, but there's not much we can do about it."

Sergeant said researchers at MessageLabs see about 2 million different computers in the botnet sending out spam on any given day, and he adds that he estimates the botnet generally is operating at about 10 percent of capacity.

"We've seen spikes where the owner is experimenting with something and those spikes are usually five to 10 times what we normally see," he said, noting he suspects the botnet could be as large as 50 million computers. "That means they can turn on the taps whenever they want to."

No one could provide detailed and specific comparisons between the strength of the botnet and the top supercomputers, mainly because it is hard to know for sure the size of the botnet or the power of each computer that is part of the botnet.

Adam Swidler, a senior manager with security company Postini, told InformationWeek that while he thinks the botnet is in the 1 million to 2 million range, he still thinks it can easily overpower a major supercomputer.

"If you calculate pure theoretical throughput, then I'm sure the botnet has more capacity than IBM's BlueGene. If you sat them down to play chess, the botnet would win."

Since the botnet won't be entered in any supercomputer competition, what does this mean for the IT or security manager trying to protect a company?

It means the cyber criminals who control the botnet have a tremendous amount of destructive power at their fingertips. Early this summer, the Baltic nation of Estonia was pounded in a cyberwar that saw distributed denial-of-service attack primarily targeting the Estonian government, banking, media, and police sites.

To protect its network, the country had to shut down key computer systems, and targeted sites were inaccessible outside the country for extended periods.

Swidler said he has no doubt if the Storm worm bosses focused a denial-of-service (DoS) attack on a company, Internet service provider, or government agency inside the United States, it could do a great deal of damage.

"I think there's no question they could damage any single company, whether through a DoS attack or a spam barrage," he added. "I'd be less worried about a Yahoo or a Bank of America than the thousands of mid-sized banks that aren't as well protected. But undoubtedly, this could do a great deal of damage."

Swidler said there's always the background thought that an enemy of a country could basically rent the botnet and launch a DoS attack, shutting down government agencies, utilities or financial centers.

"It's a lot of computing power that could be focused to do a lot of damage," he added. "It's grid computing gone bad."

Last month, Ren-Isac, a collaboration of higher-education security researchers, sent out a warning that the Storm worm authors had another trick up their sleeves. The botnet actually is attacking computers that are trying to weed it out. It's set up to launch a distributed denial-of-service attack against any computer that is scanning a network for vulnerabilities or malware.

The warning noted that researchers have seen "numerous" Storm-related DoS attacks recently.

MessageLabs' Sergeant said the botnet also has been launching DoS attacks against anti-spam organizations and even individual researchers who have been investigating it.

"If a researcher is repeatedly trying to pull down the malware to examine it the botnet knows you're a researcher and launches an attack against you," he said.

Lawrence Baldwin, chief forensic officer of MyNetWatchman.com, said he doesn't have a handle on how big the overall botnet has become but he's calculated that 5,000 to 6,000 computers are being used just to host the malicious Web sites that the Storm worm spam e-mails are linking users to. And he added that while the now-well-known e-cards and fake news spam is being used to build up the already massive botnet, the authors are using pump-and-dump scams to make money.


"That's pretty scary," he said. "Cumulatively, Storm is sending billions of messages a day. It could be double digits in the billions, easily."

Swidler said that since mid-July, Postini researchers have recorded 1.2 billion e-mails that have been spit out by the botnet. A record was set on Aug. 22 when 57 million virus-infected messages -- 99 percent of them from the Storm worm -- were tracked crossing the Internet.

According to researchers at SecureWorks, the botnet sent out 6,927 e-mails in June to the company's 1,800 customers. In July, that number ballooned to 20,193,134. Since Aug. 8, they've counted 10,218,196.
shocked.gif
 
It is time that they started to go after the biggest of these criminal enterprises. It should be possible to identify some of the people and organizations involved through the use of honeypots. If severl hundred of these criminals started to go to prison there would probably be a major reduction in all of this stuff.

Individual computer users could have an impact also. There are a lot of people who do not have antivirus, antispyware, and other forms of antimalware protection, even though a lot of stuff is free. And there are still a lot of people who will download any email attachment that that they come across, or downlaod a 'cute' butterfly screensaver, or visit dangerous websites like pornography websites, peer-to-peer file sharing networks, and pirated software websites. An effective education program might reduce the number of home computers that are unprotected from attack. And an effective education program might reduce the number of email attachments and strange software on the internet from being downloaded.

I know where I work (hundreds of employees) there are people who just can't resist including that email attachment in their emails. If everybody went to plain text email the problems with adware, spyware, Trojan Horse programs, botnets, etc., would probably be greatly reduced.
 
Quote:


If everybody went to plain text email the problems with adware, spyware, Trojan Horse programs, botnets, etc., would probably be greatly reduced.




THAT is the bottom line with 95% of malware problems these days. Set your email up so there's nothing but plain text for junk email and never EVER download an attached file from someone you absolutely 100% don't know, and you'll likely not get infected.

I've been using a product called Geswall lately as well; it isolates web browsers, email/chat clients etc. (anything that can access the internet) from the rest of your machine. There's a free version. Seems to be as effective as Defensewall (which has no free version). It's download, install and forget easy to use.
 
Another thought: if you have a trojan or a worm or something on your machine and you half way know your computer, you'll know it's there most likely because your computer will act WEIRD; CPU will go crazy in spurts, things will be slow, etc.

I really think people that get infected are the types who, like stated above, click on every and any link, download attachments, couldn't even tell you whether they have antivirus/antispyware software (let alone when it was last updated). It's those types who become parts of botnets.
 
You can't even trust the people you know. A worm can be designed to sent copies of itself to every email address in a person's address book. That attachment in an email that came supposedly from your Mom could actually be a virus or worm or Trojan Horse program. It is best just to never download email attachments. Tell your family that if they want to send you something like photos or whatever it would be better to make printouts of the photos and send them to you in the mail.

I know a woman who loves to send all sorts of email attachments. I don't want to make her angry and I want to keep her as a friend. But she searches the internet for every cute joke she can find, gets joke photos from all over the internet, believes in every virus hoax email mass-mailing, and pretty much drives me crazy. She also mass emails everybody she knows without making use of blind copies and so forth, so everybody can see the email addresses of all kinds of people you don't know. I have tried to educate her which is useless. I would much prefer plain text email from her addressed to just me rather than sisty people at once. A plain text email message addresed to just you is so much better and heart warming rather than an email containing weird attachments sent to several people at once.

I don't tell her that I simply refuse to open email attachments. I delete all of them except those that come from my immediate family or else an email attachment that I am personally expecting.

If you have friends like the woman I talked about above and if you open every emial attachment that you are sent your luck will sooner or later run out. Just say no to email attachments.
 
Status
Not open for further replies.
Back
Top