Storm worm dissected

By Justin Mann on
It wasn't all that long ago that the Storm worm made its march across the Internet, with millions of machines becoming infected. Then, here at TechSpot we spoke to someone in the industry regarding the citing and future potential of this nasty beast. Now, we have a full fledged anatomy of the worm, and it seems it is much more devious than previously thought.

In a report by Joe Stewart at SecureWorks, he details the history and functions of this worm in a very interesting, but highly technical report. It seems it has a level of sophistication that has gone largely unnoticed, lending credence to those who say it may resurface in new forms. The worm installs rootkits, uses P2P networking to link itself to other copies around the world, is a DDoS utility and a host of other things. If you don't mind a bit of technical reading, it is quite fascinating.

Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...
Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.