• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Whitepapers
  • Industry Voice
  • Data Strategy Spotlight
  • Newsletters
  • Whitepapers
    • Inqlogo 120x194
      Five things you should look for in choosing a Testing provider

      Choosing a Testing Partner can be complex.  So what do you look for?  This guide offers insight into the qualities you must look for in choosing a Testing provider.  Download now to learn more.

      Download
      Inqlogo 120x194
      Your questions answered: How to protect your data in the cloud

      The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Follow us
    • Twitter
    • Newsletters
    • Facebook
  • Newsletter
  • Industry Voice
  • Data Strategy Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Trending
  • General election
  • Huawei sues FCC
  • Xerox vs HP
  • Galaxy S11
  • McAfee 2020
The Inquirer

Storm Work botnet broken up

Up for sale

  • Nick Farrell
  • 17 October 2007
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

SECURITY expert Joe Stewart reckons that the Storm botnet has been broken up into smaller networks so that it can be flogged to spammers and DoS attackers.

Stewart, who works for SecureWorks, said the latest variants of Storm are now using a 40-byte key to encrypt their Overnet/eDonkey peer-to-peer traffic.

Writing in his bog, Stewart said that this allows the Storm author to segment the botnet into smaller networks and flog it off to other spammers.

He warned that if this happens the Storm Work network would be all over the net really quickly.

It has been estimated that between one to 10 million CPUs are part of the Storm Work network.

On the plus side, Stewart said that the new encryption scheme meant it was easier to distinguish Storm-related traffic from legitimate Overnet/eDonkey P2P traffic. ยต

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  

INQ Latest

Comet Lake-S leaks keep hitting earth
Intel Comet Lake-S leak teases AMD-chasing six-core Core i5-10600

Hype for HyperThreading

  • Chips
  • 13 December 2019
Apple's parental controls in iOS 13.3 can be easily bypassed
Apple's parental controls in iOS 13.3 can be easily bypassed

Hey kids, leave them iPhones alone

  • Software
  • 13 December 2019
Opera GX brings gaming-led browsing to macOS
Opera GX brings gaming-led browsing to macOS

The Mac lady sings

  • Software
  • 13 December 2019
Google Assistant gets 'Interpreter Mode' on iOS and Android
Google Assistant gets 'Interpreter Mode' on iOS and Android

Babel in yo ear

  • Software
  • 13 December 2019
Back to Top

Most read

Apple's iPhone 12 won't see a significant price increase, claims Kuo
Apple's iPhone 12 won't see a significant price increase, claims analyst
Comet Lake-S leaks keep hitting earth
Intel Comet Lake-S leak teases AMD-chasing six-core Core i5-10600
Apple's parental controls in iOS 13.3 can be easily bypassed
Apple's parental controls in iOS 13.3 can be easily bypassed
Windows 7 goes end-of-life in a month
Windows 7 goes end-of-life in a month
Microsoft goes all cubist with Xbox Series X reveal
Microsoft goes all cubist with Xbox Series X reveal
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • Newsletters
  • Facebook

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017