SlideShare a Scribd company logo
1 of 10
Download to read offline
Storm Network Stress Tester: Security
Threat
Highlights from a Prolexic DDoS Threat Advisory
©2014 AKAMAI | FASTER FORWARDTM
What is Storm Network Stress Tester
• Storm is an Asian crimeware kit designed for the creation
of botnets for DDoS attacks
• Malicious actors use Storm to generate an executable
payload
Users on other computers are then tricked into
downloading and running the executable
• Once executed on a Windows XP (or higher) machine,
Storm establishes remote administration (RAT) capabilities
• Attackers can then command infected computers to
execute a DDoS attack against a target
©2014 AKAMAI | FASTER FORWARDTM
Remote Administration (RAT)
• Once installed, Storm exposes RAT capabilities
• Attackers can
•Perform directory traversal
•Upload and download files
•Remotely execute commands
•Activate DDoS attack capabilities
• These versatile capabilities allow for almost any form of
cybercrime, including the extraction of sensitive personal
data and the infection of other machines
©2014 AKAMAI | FASTER FORWARDTM
DDoS Capabilities
• Storm supports up to four simultaneous DDoS attack
types
• UDP, TCP, and ICMP attacks are all supported
• A single infected machine, using only a single attack type,
was able to generate up to 12 Mbps of DDoS traffic
• Potential for massive attacks by exploiting a large number
of infected hosts
©2014 AKAMAI | FASTER FORWARDTM
Infection Targets
• Storm targets Microsoft Windows operating systems
(XP and later)
• Execution of Storm payloads on Vista and later
operating systems requires disabling User Access Control
(UAC) – XP lacks this feature
• However, sophisticated attackers have bypassed this
limitation to increase the rate of infection
• Storm infection still a threat to later operating systems
• Infection rates likely to be much higher on XP
©2014 AKAMAI | FASTER FORWARDTM
The Chinese Connection
• The program contains multiple references to China in the
code and filenames
•i.e. - “Windows China Driver”
• Windows XP is the dominant operating system in China –
60% of desktop computers use XP
• Storm appears to be designed to infect victims running
XP operating systems in China
• Massive demographic of potential zombies means a
serious potential for massive, orchestrated DDoS attacks
against targets worldwide
©2014 AKAMAI | FASTER FORWARDTM
Command Structure
• Storm follows a client-
server architecture
• Payloads are sent out
from a command-and-
control (C2) server
• Infected hosts connect
back to C2 and wait for
commands
• The C2 can then
manipulate the zombies
through RAT
commands and order
DDoS attacks
©2014 AKAMAI | FASTER FORWARDTM
If you are a target of a Storm Attack
• Attackers can easily use tools like Storm to set up and
control botnets for DDoS attacks
• The Storm Network Stress Tester Threat Advisory by the
Prolexic Security Engineering and Research Team
(PLXsert) explains how to mitigate Storm DDoS attacks
•Attack signatures against Storm TCP, UDP, and ICMP
attacks
•Identifying strings in the binary and process names
©2014 AKAMAI | FASTER FORWARDTM
Threat Advisory: Storm DDoS toolkit
• Download the threat advisory, Storm Network Stress
Tester, at www.prolexic.com/storm
• This DDoS threat advisory includes:
• Indicators of infection by the Storm kit
• Architecture of the crimeware kit
• Dropper payload generation and infection
• Fortification methods
• Command structure
• DDoS attack types, payloads and attack signatures
©2014 AKAMAI | FASTER FORWARDTM
About Prolexic (now part of Akamai)
• We have successfully stopped DDoS attacks for more
than a decade
• Our global DDoS mitigation network and 24/7 security
operations center (SOC) can stop even the largest
attacks that exceed the capabilities of other DDoS
mitigation service providers

More Related Content

Recently uploaded

How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good qualitycathy664059
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...PRnews2
 

Recently uploaded (20)

How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate Professional
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good quality
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Toyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage TechniquesToyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage Techniques
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
 

DDoS Attack Threats | Storm Network Stress Tester | Akamai Presentation

  • 1. Storm Network Stress Tester: Security Threat Highlights from a Prolexic DDoS Threat Advisory
  • 2. ©2014 AKAMAI | FASTER FORWARDTM What is Storm Network Stress Tester • Storm is an Asian crimeware kit designed for the creation of botnets for DDoS attacks • Malicious actors use Storm to generate an executable payload Users on other computers are then tricked into downloading and running the executable • Once executed on a Windows XP (or higher) machine, Storm establishes remote administration (RAT) capabilities • Attackers can then command infected computers to execute a DDoS attack against a target
  • 3. ©2014 AKAMAI | FASTER FORWARDTM Remote Administration (RAT) • Once installed, Storm exposes RAT capabilities • Attackers can •Perform directory traversal •Upload and download files •Remotely execute commands •Activate DDoS attack capabilities • These versatile capabilities allow for almost any form of cybercrime, including the extraction of sensitive personal data and the infection of other machines
  • 4. ©2014 AKAMAI | FASTER FORWARDTM DDoS Capabilities • Storm supports up to four simultaneous DDoS attack types • UDP, TCP, and ICMP attacks are all supported • A single infected machine, using only a single attack type, was able to generate up to 12 Mbps of DDoS traffic • Potential for massive attacks by exploiting a large number of infected hosts
  • 5. ©2014 AKAMAI | FASTER FORWARDTM Infection Targets • Storm targets Microsoft Windows operating systems (XP and later) • Execution of Storm payloads on Vista and later operating systems requires disabling User Access Control (UAC) – XP lacks this feature • However, sophisticated attackers have bypassed this limitation to increase the rate of infection • Storm infection still a threat to later operating systems • Infection rates likely to be much higher on XP
  • 6. ©2014 AKAMAI | FASTER FORWARDTM The Chinese Connection • The program contains multiple references to China in the code and filenames •i.e. - “Windows China Driver” • Windows XP is the dominant operating system in China – 60% of desktop computers use XP • Storm appears to be designed to infect victims running XP operating systems in China • Massive demographic of potential zombies means a serious potential for massive, orchestrated DDoS attacks against targets worldwide
  • 7. ©2014 AKAMAI | FASTER FORWARDTM Command Structure • Storm follows a client- server architecture • Payloads are sent out from a command-and- control (C2) server • Infected hosts connect back to C2 and wait for commands • The C2 can then manipulate the zombies through RAT commands and order DDoS attacks
  • 8. ©2014 AKAMAI | FASTER FORWARDTM If you are a target of a Storm Attack • Attackers can easily use tools like Storm to set up and control botnets for DDoS attacks • The Storm Network Stress Tester Threat Advisory by the Prolexic Security Engineering and Research Team (PLXsert) explains how to mitigate Storm DDoS attacks •Attack signatures against Storm TCP, UDP, and ICMP attacks •Identifying strings in the binary and process names
  • 9. ©2014 AKAMAI | FASTER FORWARDTM Threat Advisory: Storm DDoS toolkit • Download the threat advisory, Storm Network Stress Tester, at www.prolexic.com/storm • This DDoS threat advisory includes: • Indicators of infection by the Storm kit • Architecture of the crimeware kit • Dropper payload generation and infection • Fortification methods • Command structure • DDoS attack types, payloads and attack signatures
  • 10. ©2014 AKAMAI | FASTER FORWARDTM About Prolexic (now part of Akamai) • We have successfully stopped DDoS attacks for more than a decade • Our global DDoS mitigation network and 24/7 security operations center (SOC) can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers