SlideShare a Scribd company logo
Stormy Weather
A quantitative assessment of the Storm web threat in 2007
  q

Raimund Genes, Anthony Arrott, and David Sancho
Trend Micro




VB2008 - Ottawa                 October 2008
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 Storm activity by country of IP source




VB2008 - Ottawa   October 2008   2                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 How does Storm infect computers?
 •       Users open executable email attachments
         (e.g. ‘Full Story.exe’)

         or

 •       Users visit infected websites
         (e.g. ‘click_for_full_story’)


 •       Either way, user click results in becoming a remotely-controlled
         botnet zombie




VB2008 - Ottawa   October 2008   3                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 What does Storm do to make money for its perpetrators?

 •       ‘Botnets for rent’ in underground economy

 •       Rented botnets used:
         –        as spam engines
         –        in denial of service attacks

 •       Sell mined zombie data (e.g. address book contents)




VB2008 - Ottawa      October 2008   4              Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 How does Storm protect itself from detection & removal?
 •       Infects host zombies with rootkits

 •       Provides periodic updates of malware code

 •       Botnets configured
         –        decentralized control
         –        rotating activation
         –        enhanced encryption
                           encr ption
         –        frequent code replacement




VB2008 - Ottawa      October 2008   5              Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 Storm outbreaks in 2007
         – 17 Jan 07 – “European Storm” Spam
         – 12 Apr 07 – “Worm Alert” Spam
         – 27 Jun 07 – “E-card” (applet.exe)
         – 4 July 07 – “231st B-day”
         – 2 Sep 07 – “Labor Day” (labor.exe)
         – 5 Sep 07 – “Tor Proxy”
                       Tor Proxy
         – 10 Sep 07 – “NFL Tracker”
         – 17 S 07 – “A d G
              Sep    “Arcade Games”
                                  ”

                                                       Adopted from: Porras Saidi & Yagneswaran
                                                                     Porras,


VB2008 - Ottawa   October 2008   6                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                  spam




VB2008 - Ottawa   October 2008   7                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                                                       source: Trend Micro


VB2008 - Ottawa   October 2008   8                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                             spam volume




VB2008 - Ottawa   October 2008   9                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




VB2008 - Ottawa   October 2008   10                Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                                                       ?

VB2008 - Ottawa   October 2008   11                Copyright 2008 - Trend Micro Inc.
Thank you




VB2008 - Ottawa   October 2008

More Related Content

Similar to Stormy Weather

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
Andrew Wong
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
Cristian Garcia G.
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010
Andris Soroka
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS IntroductionKae Hsu
 
Stormy Weather
Stormy WeatherStormy Weather
Stormy Weather
Anthony Arrott
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last Decade
Teleport
 
McAfee Vulnerability Manager
McAfee Vulnerability ManagerMcAfee Vulnerability Manager
McAfee Vulnerability Manager
Dragos Lungu
 
Top Ten Hacks of 2007
Top Ten Hacks of 2007Top Ten Hacks of 2007
Top Ten Hacks of 2007
Jeremiah Grossman
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...VirtSGR
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
African Cyber Security Summit
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
Miguel Hernández y López
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneck
Anthony Arrott
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
Dr David Probert
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011Agora Group
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
Trend Micro (EMEA) Limited
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
Gil Megidish
 
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat Security Conference
 
Future of Destructive Malware
Future of Destructive MalwareFuture of Destructive Malware
Future of Destructive Malware
Greg Foss
 

Similar to Stormy Weather (20)

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Stormy Weather
Stormy WeatherStormy Weather
Stormy Weather
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last Decade
 
McAfee Vulnerability Manager
McAfee Vulnerability ManagerMcAfee Vulnerability Manager
McAfee Vulnerability Manager
 
Top Ten Hacks of 2007
Top Ten Hacks of 2007Top Ten Hacks of 2007
Top Ten Hacks of 2007
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
 
STUXNET_
STUXNET_STUXNET_
STUXNET_
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneck
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
 
Future of Destructive Malware
Future of Destructive MalwareFuture of Destructive Malware
Future of Destructive Malware
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Stormy Weather

  • 1. Stormy Weather A quantitative assessment of the Storm web threat in 2007 q Raimund Genes, Anthony Arrott, and David Sancho Trend Micro VB2008 - Ottawa October 2008
  • 2. Stormy Weather A quantitative assessment of the Storm web threat in 2007 Storm activity by country of IP source VB2008 - Ottawa October 2008 2 Copyright 2008 - Trend Micro Inc.
  • 3. Stormy Weather A quantitative assessment of the Storm web threat in 2007 How does Storm infect computers? • Users open executable email attachments (e.g. ‘Full Story.exe’) or • Users visit infected websites (e.g. ‘click_for_full_story’) • Either way, user click results in becoming a remotely-controlled botnet zombie VB2008 - Ottawa October 2008 3 Copyright 2008 - Trend Micro Inc.
  • 4. Stormy Weather A quantitative assessment of the Storm web threat in 2007 What does Storm do to make money for its perpetrators? • ‘Botnets for rent’ in underground economy • Rented botnets used: – as spam engines – in denial of service attacks • Sell mined zombie data (e.g. address book contents) VB2008 - Ottawa October 2008 4 Copyright 2008 - Trend Micro Inc.
  • 5. Stormy Weather A quantitative assessment of the Storm web threat in 2007 How does Storm protect itself from detection & removal? • Infects host zombies with rootkits • Provides periodic updates of malware code • Botnets configured – decentralized control – rotating activation – enhanced encryption encr ption – frequent code replacement VB2008 - Ottawa October 2008 5 Copyright 2008 - Trend Micro Inc.
  • 6. Stormy Weather A quantitative assessment of the Storm web threat in 2007 Storm outbreaks in 2007 – 17 Jan 07 – “European Storm” Spam – 12 Apr 07 – “Worm Alert” Spam – 27 Jun 07 – “E-card” (applet.exe) – 4 July 07 – “231st B-day” – 2 Sep 07 – “Labor Day” (labor.exe) – 5 Sep 07 – “Tor Proxy” Tor Proxy – 10 Sep 07 – “NFL Tracker” – 17 S 07 – “A d G Sep “Arcade Games” ” Adopted from: Porras Saidi & Yagneswaran Porras, VB2008 - Ottawa October 2008 6 Copyright 2008 - Trend Micro Inc.
  • 7. Stormy Weather A quantitative assessment of the Storm web threat in 2007 spam VB2008 - Ottawa October 2008 7 Copyright 2008 - Trend Micro Inc.
  • 8. Stormy Weather A quantitative assessment of the Storm web threat in 2007 source: Trend Micro VB2008 - Ottawa October 2008 8 Copyright 2008 - Trend Micro Inc.
  • 9. Stormy Weather A quantitative assessment of the Storm web threat in 2007 spam volume VB2008 - Ottawa October 2008 9 Copyright 2008 - Trend Micro Inc.
  • 10. Stormy Weather A quantitative assessment of the Storm web threat in 2007 VB2008 - Ottawa October 2008 10 Copyright 2008 - Trend Micro Inc.
  • 11. Stormy Weather A quantitative assessment of the Storm web threat in 2007 ? VB2008 - Ottawa October 2008 11 Copyright 2008 - Trend Micro Inc.
  • 12. Thank you VB2008 - Ottawa October 2008