'We're not scared' of Storm, say researchers

Security pros spooked by Storm botnet's retaliation? Not exactly.

Reports that security researchers are running scared from hackers responsible for the Storm Trojan are overblown, say some of the people who have dug into the complex malware.

Earlier this week, Josh Corman of IBM's Internet Security Systems said that Storm, a multifaceted Trojan Horse that has been used to gather a substantial army of bots (or compromised computers), strikes back using distributed denial-of-service (DDoS) attacks when it senses probes of its command-and-control network. These attacks, Corman said, have researchers spooked.

"They're afraid," Corman told attendees at Interop New York. "They find these things but never say anything about them."

Not even close, said two researchers.

"No, we're not scared," said Joe Stewart, a senior security researcher at SecureWorks who has been rooting around Storm since it first appeared earlier this year. "Cautious, possibly. We're still going to do our research."

Zulfikar Ramzan, a senior principal researcher at Symantec, another vendor that has been posting results from its Storm research for months, agreed. "I don't think it's made [researchers] more scared. They're still publishing."

Corman nailed the attacks, however, Stewart and Ramzan said. Both confirmed that they knew Storm had launched DDoS attacks, and as Corman pointed out, that the Trojan has an automated early warning system that sniffs probes made of the botnet. "Storm understands any attempt to understand it, then notifies the bot controller," said Ramzan. "It seems to recognize a threat after several different attempts to probe the bot."

The tactic isn't new, but Storm has taken it to higher levels of automation, said Ramzan.

Attacks against spam and malware fighters aren't anything out of the ordinary. "This has happened before to different groups that seem to threaten the criminals," said Stewart. "Spamhaus undergoes attacks fairly frequently, for example."

There are ways for researchers to disguise themselves or cover their tracks if they're concerned about hacker counterattacks, both researchers said, although using them can be dicey for those on the right side of the law. "You have to be careful," noted Stewart. "You don't want to have some innocent ISP to end up the brunt of an attack. We don't want any collateral damage."

Symantec examines bots built by Storm, and other such malware, in a controlled, isolated environment, added Ramzan. The emulated network lets researchers ping and ding the bot without any chance that it will "talk" to the outside world, and so reach the botnet controller.

As for why Storm retaliates, each researcher had an explanation. "Hackers discovered that they can get away with DDoS attacks," said Stewart, using a variation of George Mallory's famous "because it's there" rationale. "The really big one was on Blue Security last year. No one was ever charged, and Blue Security had to take down its business. That was a win-win for the hackers, so why not go after others?"

Blue Security, an Israeli-based antispam company, threw in the towel in May 2006 after days of crippling DDoS attacks launched against its network and Internet provider. Blue Security was best known for its community-based "Do Not Intrude" program that spammed spammers with large numbers of opt-out requests from the half-million users who had signed on to the concept.

"The only thing I can think of is that they're trying to send a message of some sort," said Ramzan, who pointed out that by its nature, a DDoS attack exposes the botnet itself to retaliation or take-down. That's why DDoS-for-pay has been decreasing, he said. "It's a dangerous way for a bot master to make money, because they're exposing their entire army of bots to you. Why they would do that to hit back, I don't know. Maybe they think they have bots to spare."

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Show Comments


James Cook University - Master of Data Science Online Course

Learn more >




Back To Business Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?