SlideShare a Scribd company logo
1 of 12
Stormy Weather
A quantitative assessment of the Storm web threat in 2007
  q

Raimund Genes, Anthony Arrott, and David Sancho
Trend Micro




VB2008 - Ottawa                 October 2008
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 Storm activity by country of IP source




VB2008 - Ottawa   October 2008   2                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 How does Storm infect computers?
 •       Users open executable email attachments
         (e.g. ‘Full Story.exe’)

         or

 •       Users visit infected websites
         (e.g. ‘click_for_full_story’)


 •       Either way, user click results in becoming a remotely-controlled
         botnet zombie




VB2008 - Ottawa   October 2008   3                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 What does Storm do to make money for its perpetrators?

 •       ‘Botnets for rent’ in underground economy

 •       Rented botnets used:
         –        as spam engines
         –        in denial of service attacks

 •       Sell mined zombie data (e.g. address book contents)




VB2008 - Ottawa      October 2008   4              Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 How does Storm protect itself from detection & removal?
 •       Infects host zombies with rootkits

 •       Provides periodic updates of malware code

 •       Botnets configured
         –        decentralized control
         –        rotating activation
         –        enhanced encryption
                           encr ption
         –        frequent code replacement




VB2008 - Ottawa      October 2008   5              Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 Storm outbreaks in 2007
         – 17 Jan 07 – “European Storm” Spam
         – 12 Apr 07 – “Worm Alert” Spam
         – 27 Jun 07 – “E-card” (applet.exe)
         – 4 July 07 – “231st B-day”
         – 2 Sep 07 – “Labor Day” (labor.exe)
         – 5 Sep 07 – “Tor Proxy”
                       Tor Proxy
         – 10 Sep 07 – “NFL Tracker”
         – 17 S 07 – “A d G
              Sep    “Arcade Games”
                                  ”

                                                       Adopted from: Porras Saidi & Yagneswaran
                                                                     Porras,


VB2008 - Ottawa   October 2008   6                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                  spam




VB2008 - Ottawa   October 2008   7                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                                                       source: Trend Micro


VB2008 - Ottawa   October 2008   8                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                             spam volume




VB2008 - Ottawa   October 2008   9                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




VB2008 - Ottawa   October 2008   10                Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                                                       ?

VB2008 - Ottawa   October 2008   11                Copyright 2008 - Trend Micro Inc.
Thank you




VB2008 - Ottawa   October 2008

More Related Content

Similar to Stormy Weather

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Andris Soroka
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS IntroductionKae Hsu
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTeleport
 
McAfee Vulnerability Manager
McAfee Vulnerability ManagerMcAfee Vulnerability Manager
McAfee Vulnerability ManagerDragos Lungu
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...VirtSGR
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneckAnthony Arrott
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011Agora Group
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsTrend Micro (EMEA) Limited
 
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat Security Conference
 
Future of Destructive Malware
Future of Destructive MalwareFuture of Destructive Malware
Future of Destructive MalwareGreg Foss
 

Similar to Stormy Weather (20)

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Stormy Weather
Stormy WeatherStormy Weather
Stormy Weather
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last Decade
 
McAfee Vulnerability Manager
McAfee Vulnerability ManagerMcAfee Vulnerability Manager
McAfee Vulnerability Manager
 
Top Ten Hacks of 2007
Top Ten Hacks of 2007Top Ten Hacks of 2007
Top Ten Hacks of 2007
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
 
STUXNET_
STUXNET_STUXNET_
STUXNET_
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneck
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
 
Future of Destructive Malware
Future of Destructive MalwareFuture of Destructive Malware
Future of Destructive Malware
 

Recently uploaded

Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Stormy Weather

  • 1. Stormy Weather A quantitative assessment of the Storm web threat in 2007 q Raimund Genes, Anthony Arrott, and David Sancho Trend Micro VB2008 - Ottawa October 2008
  • 2. Stormy Weather A quantitative assessment of the Storm web threat in 2007 Storm activity by country of IP source VB2008 - Ottawa October 2008 2 Copyright 2008 - Trend Micro Inc.
  • 3. Stormy Weather A quantitative assessment of the Storm web threat in 2007 How does Storm infect computers? • Users open executable email attachments (e.g. ‘Full Story.exe’) or • Users visit infected websites (e.g. ‘click_for_full_story’) • Either way, user click results in becoming a remotely-controlled botnet zombie VB2008 - Ottawa October 2008 3 Copyright 2008 - Trend Micro Inc.
  • 4. Stormy Weather A quantitative assessment of the Storm web threat in 2007 What does Storm do to make money for its perpetrators? • ‘Botnets for rent’ in underground economy • Rented botnets used: – as spam engines – in denial of service attacks • Sell mined zombie data (e.g. address book contents) VB2008 - Ottawa October 2008 4 Copyright 2008 - Trend Micro Inc.
  • 5. Stormy Weather A quantitative assessment of the Storm web threat in 2007 How does Storm protect itself from detection & removal? • Infects host zombies with rootkits • Provides periodic updates of malware code • Botnets configured – decentralized control – rotating activation – enhanced encryption encr ption – frequent code replacement VB2008 - Ottawa October 2008 5 Copyright 2008 - Trend Micro Inc.
  • 6. Stormy Weather A quantitative assessment of the Storm web threat in 2007 Storm outbreaks in 2007 – 17 Jan 07 – “European Storm” Spam – 12 Apr 07 – “Worm Alert” Spam – 27 Jun 07 – “E-card” (applet.exe) – 4 July 07 – “231st B-day” – 2 Sep 07 – “Labor Day” (labor.exe) – 5 Sep 07 – “Tor Proxy” Tor Proxy – 10 Sep 07 – “NFL Tracker” – 17 S 07 – “A d G Sep “Arcade Games” ” Adopted from: Porras Saidi & Yagneswaran Porras, VB2008 - Ottawa October 2008 6 Copyright 2008 - Trend Micro Inc.
  • 7. Stormy Weather A quantitative assessment of the Storm web threat in 2007 spam VB2008 - Ottawa October 2008 7 Copyright 2008 - Trend Micro Inc.
  • 8. Stormy Weather A quantitative assessment of the Storm web threat in 2007 source: Trend Micro VB2008 - Ottawa October 2008 8 Copyright 2008 - Trend Micro Inc.
  • 9. Stormy Weather A quantitative assessment of the Storm web threat in 2007 spam volume VB2008 - Ottawa October 2008 9 Copyright 2008 - Trend Micro Inc.
  • 10. Stormy Weather A quantitative assessment of the Storm web threat in 2007 VB2008 - Ottawa October 2008 10 Copyright 2008 - Trend Micro Inc.
  • 11. Stormy Weather A quantitative assessment of the Storm web threat in 2007 ? VB2008 - Ottawa October 2008 11 Copyright 2008 - Trend Micro Inc.
  • 12. Thank you VB2008 - Ottawa October 2008