Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

storm worm

Researchers Hijack Storm Worm to Track Profits

by Shanmuga

"A single response from 12 million e-mails is all it takes for spammers to turn annual profits of millions of dollars promoting knockoff pharmaceuticals, according to an unprecedented new study on the economics of spam.

Read the full article →

Spam: Why spam isn’t going away soon

by Shanmuga

“Recently, Symantec said in its February 2008 State of Spam report that 78.5 percent of all e-mail is spam; they also said most of that is now coming from Europe. That’s a change from previous reports that had suggested servers in North America were responsible. What the Symantec report doesn’t explicitly state is that much

Read the full article →

Security: Limelight kills botnets better than cops do

by Shanmuga

"Botnet operators have become public enemy number-one as consumers, businesses and governments fall foul to identity theft, DDoS attacks and spam. Yet no one appears to be able to stop the spread of bots — except maybe the media.

Read the full article →

Security: What IT can learn from botnets

by Shanmuga

"Josh Corman is the host protection architect for Internet Security Systems, Inc. (ISS), with more than eight years of experience in security and networking software. What was refreshing was Corman’s out-of-the-box thinking on the distributed networks currently being used by online criminals. Of the most popular of these networks, he said "Storm did a lot

Read the full article →

Storm’s Creators Identified

by Shanmuga

"American and Russian law enforcement agencies have finally identified the criminals behind the Storm worm, one of the nastiest pieces of malware to ever hit the Internet. Now comes the hard part: arresting them.

Read the full article →

Malware: Storm switches tactics third time, adds rootkit

by Shanmuga

"The ongoing Storm Trojan attack that began Monday has morphed again, security researchers said today, changing the malicious file’s name, shifting to new malware hosting servers, and adding a rootkit to cloak the bot code from anti-virus software.

Read the full article →