Video Screencast Help
Security Response

“Storm Trojan” Illustrated

Created: 25 Jan 2007 08:00:00 GMT • Updated: 23 Jan 2014 18:53:13 GMT
Dave Cole's picture
0 0 Votes
Login to vote

We’re happy to report that so far today, Peacomm and Mixor.Q activity is lighter than the maelstrom of activity we’ve seen in previous days. We’ve noted no new spam runs today, with the malware submissions and activity levels tapering off a bit as well. Phew! Our Security Response team in Pune, India, has pulled together a slick Flash-based run through of the attack, which can be viewed using the following URL:
http://www.symantec.com/content/en/us/home_homeoffice/media/flash/peacomm.html

Just a little more info on this threat you may have not heard before—it is communicating over peer-to-peer using the Overnet protocol and network (of eDonkey fame). After connecting to the network, the threat then searches for some particular hashes (searches are done by hash, not by specific filename) and eventually it receives a reply that includes some 'meta tag' information. The meta tag information is encrypted and contains information on where/what to download (e.g. Mixor.Q, Trojan.Abwiz.F). You can stay up-to-date on the outbreak alert for the Storm Trojan by visiting the Threat Advisory Center.