Stormy love letters

Posted by   Virus Bulletin on   Jan 16, 2008

Storm botnet celebrates birthday with new wave of spam.

Earlier this week malware experts warned of likely increased activity of the Storm botnet around Valentine's Day next month. However, the botherders seem to have taken this as a prompt as, even though Valentine's Day is still a month away, the botnet has since been responsible for a massive new spam attack which, according to Sophos, accounted for eight per cent of all email traffic yesterday afternoon.

The emails, with subject lines such as 'Falling In Love with You' and 'You're the One', try to lure the recipient into visiting a website - from which the browser will attempt to download a piece of malware (a copy of the Storm worm) onto the user's computer.

The latest wave of activity confirms the regrettable fact that the botnet, which celebrates its first birthday in three days time, is as alive and active as ever.

More can be found on the stormy love letters at F-Secure here, at Sophos here and at Trend Micro here.

Posted on 16 January 2008 by Virus Bulletin



Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.