So what’s coming next, after Storm you might ask. You might remember Storm Worm Descending on Blogspot recently and other news about Botnets spiraling out of control accounting for almost 25% of online computers.
Well apparently next will be p2p or peer to peer Botnets which could literally blow Storm away.
You know about the Storm Trojan, which is spread by the world’s largest botnet. But what you may not know is there’s now a new peer-to-peer based botnet emerging that could blow Storm away.
“We’re investigating a new peer-to-peer botnet that may wind up rivaling Storm in size and sophistication,” says Tripp Cox, vice president of engineering for startup Damballa, which tracks botnet command and control infrastructures. “We can’t say much more about it, but we can tell it’s distinct from Storm.”
It’s hard to imagine anything bigger and more complex than Storm, which despite its nefarious intent as a DDOS and spam tool has awed security researchers with its slick design and its ability to reinvent itself when it’s at risk of detection or getting busted. Storm changed the botnet game, security experts say, and its successors may be even more powerful and wily.
Interesting developments, I’ll certainly be watching out for this and see what happens. This next generation could open up some DDoS attacks of never seen before proportions (I’m talking the ability to take whole countries offline).
Information warfare? Cyber Terrorism? Yes it’s getting very real.
Botnets are no longer just annoying, spam-pumping factories — they’re big business for criminals. This shift has even awakened enterprises, which historically have either looked the other way or been in denial about bots infiltrating their organizations.
“A year ago, the traditional method for bot infections was through malware. But now you’re getting compromised servers, with drive-by downloads so prevalent that people are getting infected without realizing it,” says Paul Ferguson, network architect for Trend Micro. “No one is immune.”
So watch out, and do educate people wherever you can about the dangers of Malware and safe surfing. A little Firefox here, a little NoScript there, a copy of Avast and a few instructions solve most problems.
Source: Dark Reading
- DAMM – Differential Analysis of Malware in Memory
- FBI Recommends Crypto Ransomware Victims Just Pay
- Fitbit Vulnerability Means Your Tracker Could Spread Malware
- Vista more insecure than XP
- Norton Internet Security ‘Keylogger’ IRC Bug
- Next-Gen Botnets Taking The Place of Storm and Srizbi
Most Read in Malware:
- Nasty Trojan Zeus Evades Antivirus Software - 77,431 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,541 views
- US considers banning DRM rootkits – Sony BMG - 44,959 views