It wasn't all that long ago that the Storm worm
made its march across the Internet, with millions of machines becoming infected. Then, here at TechSpot we spoke to someone in the industry
regarding the citing and future potential of this nasty beast. Now, we have a full fledged anatomy of the worm, and it seems it is much more devious than previously thought.
In a report by Joe Stewart at SecureWorks, he details the history and functions of this worm in a very interesting, but highly technical report
. It seems it has a level of sophistication that has gone largely unnoticed, lending credence to those who say it may resurface in new forms. The worm installs rootkits, uses P2P networking to link itself to other copies around the world, is a DDoS utility and a host of other things. If you don't mind a bit of technical reading, it is quite fascinating.