ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FYI: Storm Worm Evolves, Launches Retaliatory Attack



ÏÂÒÁÔÉÔÅ ×ÎÉÍÁÎÉÅ ÎÁ ÐÒÉÍÅÞÁÎÉÅ J. Ullrich

----------------------------
--Storm Worm Evolves, Launches Retaliatory Attack
(October 24 & 25, 2007)
The Storm worm (sometimes called Peacomm) has the capacity to launch
targeted counterattacks against the systems of users trying to probe its
command-and-control servers.  Storm is able to detect the probes and
retaliate by launching distributed denial-of-service (DDoS) attacks
against the uninvited visitors.  Researchers have been wary of
publicizing the results of their efforts to understand the worm and stop
its harmful behavior.  Storm has the capability to interrupt
applications, including security applications such as Anti-Virus
software, as they are booting up and either shut them down or render
then inert so that they appear to be running but are in fact doing
nothing.
http://www.networkworld.com/news/2007/102407-storm-worm-security.html
http://www.theregister.co.uk/2007/10/25/storm_worm_backlash/print.html
http://www.enews20.com/news_The_Storm_Worms_Striking_Back_03307.html
[Editor's Note (Ullrich): The Storm worm goes out of its way to fight
malware researchers. It has always used multiple anti-reverse
engineering techniques. This retaliatory behavior was first seen a few
months ago as malware researchers who downloaded the trojan multiple
times started to be the target of these likely automated attacks.  One
attack works as follows: Whenever you port scan a storm-infected node,
or if you download the malware several times, a subset of the storm
network will launch a denial of service attack against you. Typically
it is an ICMP flood that can last a day or so.]



 




Copyright © Lexa Software, 1996-2009.