New And Improved Storm Botnet Morphing Valentine's Malware

Waledac, formerly known as Storm, tries to keep a lower profile while it expands

Dark Reading logo in a gray background | Dark Reading

The botnet formerly known as Storm is ramping up its ability to evade detection by automatically generating thousands of different variants of its malware each day as it spreads and recruit more bots.

Waledac -- the new and improved Storm -- is using its favorite holiday, Valentine's Day, to spread the love with signature phony greeting cards and romance-themed email that Storm so infamously spread in the past. "Over the last 24 hours, we've seen over 1,000 new variants [of Waledac code]," says Pierre-Marc Bureau, a senior researcher with Eset, which expects Waledac to eventually pump out thousands of variants a day. "It was a bit lower than what we are expecting. It may not have reached many of our clients yet." That said, it's still a big jump from the around 10 new versions a day Eset had seen the botnet creating, he adds.

One of Waledac's latest attacks comes in the form of a puppy love e-card with a Valentine's-related link, as well as other warm and fuzzy-looking email. Subject lines include the usual "a Valentine card from a friend" and "you have received a Valentine E-card," but once you click the URL to retrieve the message, Waledac's malware is downloaded onto your machine. Another attack uses a phony pop-up that appears to be from Microsoft stating the machine is infected with spyware. That leads to a fake antispyware site that not only infects the machine, but also tries to sell the victim its scareware, according to Patrick Murray, director of product management for Marshal8e6.

"The authors have started adding supposed magazine endorsements and other elements that one would see on a reputable anti-malware site. The graphics within the pop-ups themselves seem to be professionally designed at this point, so it is very critical for users to treat email from unknown persons with extreme caution," says Ryan Sherstobitoff, a vice president with Panda Labs.

Meanwhile, constantly changing the look and feel of its malware is consistent with the new and improved Storm's M.O.: to avoid attracting too much attention like it used to do. Researchers last month confirmed that Waledac was basically Storm reincarnated, but with all-new malware and a more sustainable architecture that's less likely to get infiltrated and shut down. The notorious botnet Storm went MIA last fall, and researchers started to write it off. But the operators of Storm made a comeback this year with new binary bot code and stronger encryption, plus it replaced its peer-to-peer communications among its machines to HTTP, which helps camouflage its activity among other Web traffic. HTTP also makes it tough to distinguish a bot from a command and control server.

Joe Stewart, director of malware research for SecureWorks, says Storm and Waledac are completely different, however, when it comes to code and files. "It's definitely not the same programmers," he says. But the botnet's overall behavior and strategy is generally the same, he says.

Other researchers agree that the botnet's operators are taking a lower-key approach so far, while employing some of the same tactics they did with Storm -- using traditional social engineering lures of phony events and holiday email, as well as trying to mask the malware by changing it regularly.

Despite the Valentine's rush, however, Waledac's spam volume hasn't increased greatly, Stewart says. "It's curious why not," he says. One theory is the botnet operators are mainly focused for now on building out their infrastructure, which, according to different bot-hunters, is anywhere from 10,000 to 35,000 bots -- nowhere near its heyday of multiple hundreds of thousands of zombies.

So what is Waledac after? "Once it gets on a PC, it starts searching the hard drive for email addresses and default passwords. And it sends that information back to the C&C server using HTTP," Eset's Bureau says.

"Our gut is it's mostly a spam operation similar to what Storm was doing," he says. "And it can use as much as it can from the infected computers, stealing usernames and passwords."

Waledac isn't the only botnet running Valentine's Day spam scams. So far, it's not pumping out anywhere near the volume of Valentine's spam as the Cutwail botnet, for example, which is sending 6.5 percent of all Valentine-related spam now, according to Symantec's MessageLabs, which reports that Valentine's spam accounts for nearly 10 percent of all spam as of this week.

Eset's Bureau says Waledac so far has registered 115 domain names this month, most of which are Valentine's Day-related.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights