A way to disable the Storm worm has been found
A group of German research experts announced that they had found a solution against the malicious Storm computer worm that turned PCs into 'bots' to help hackers spread malicious code or send spam.
BOT is the abbreviation for PC infected with malicious code and remotely controlled by hackers. Gathering many BOTs will become a BOTNET network system. This is the leading threat on the Internet today. BOTNET specializes in using hackers to send spam or organize large-scale denial of service attacks, distribute malicious code .
One of the most effective tools to build a BOTNET is the Storm worm. This computer worm is capable of controlling BOTs through peer connectivity and eliminating the need for a central control server. One of the factors that make this worm difficult to destroy.
A way to disable the Storm worm has been found Picture 1 But recently, researchers from the University of Mannheim and the Eurécom Research Institute have found a solution of "poisoning" the Storm worm that makes it impossible to perform its inherent function.
' Our strategy is to find a solution to disable the Storm's communication path on BOTNET, thereby completely disabling this worm. Not only that, this way can help us estimate the size of the BOTNET more accurately . '
Experts said they initially used a technique to monitor PCs belonging to peer-to-peer computer networks and based on the operation of these PCs to identify which PCs were infected with malicious code. In December 2007, only about 30 minutes were decided, experts found 5,000-40,000 PCs connected to the peer-to-peer network infected with malicious code. The number of PCs is scattered across 200 different countries.
Researchers 'poisoning' technology focuses on "hitting" the technology used by Storm to create communication between BOTs. This method is done by creating a huge amount of fake content. In addition, experts also used a few other techniques to set up each part of the BOTNET network.
As a result, the Storm worm was disabled. Experts confirm that in the future, further research will help identify who is operating the Storm worm.
You should read it
- Storm Worm ruled the world of blogs
- Storm worm gave Christmas gifts with malicious code
- Nugache threatened the throne of Storm
- Storm worm 're-exported' through a joke
- Valentine 'revived' Storm Worm
- Storm returned with 'pornography storm'
- The return of 'Storm'
- Red alert: Virus attacks mass!
- Storm worm takes advantage of earthquake disaster in China
- Storm became a 'record' of spam distribution
- Storm worm landed on the Internet
- About security impotence before Storm worm