A massive spam outbreak carrying the "Storm Trojan" has already broken records, security companies said.
The new outbreak tries to trick recipients into opening a file attachment that can hijack their computers. According to researchers at Postini, the spam run is the largest in the last 12 months, and more than three times the volume of the two biggest in recent memory: a pair of blasts in December and January.
"We're seeing 50 to 60 times the normal volume of spam," said Adam Swidler, senior manager of solutions marketing at Postini.
Arriving with subject headings touting Worm Alert!, Worm Detected, Spyware Detected!, Virus Activity Detected!, the spam carries a ZIP file attachment posing as a patch for a bogus attack. The ZIP file is password-protected and the password is included in the message to further dupe recipients. It actually contains a variant of the "Storm Trojan", which installs a rootkit to cloak itself, disables security software, steals confidential information from the PC, and adds it to a bot army of compromised computers.
Irony, it seems, isn't lost on the attackers. "This is really a self-fulfilling prophecy," said Swidler, "by warning users about a worm attack to get them to click on a worm."
There's little funny about the attack. "We're seeing both a very high volume of spam and a self-replicating worm," said Swidler. "This combination is kind of sophisticated. It's technically sophisticated in how they package the payload, but also in how they're trying to fool users into clicking on the attachment."
The spam, Swidler went on, tries to convince users that their computers are already infected with malware, and now part of a botnet. "They're telling people that their email access is about to be cut off, and that they have to install this patch to continue using [email]."
Postini had counted nearly 5 million copies of the spam in 24 hours, and calculated that the run accounted for 87 percent of all malware being spread through email. Spam rates have jumped as well; Postini said 79 percent of all email is now spam, while rival MessageLabs reported a 13 percent jump in spam's slice of all messages in just one hour.
"Expect this to grow much larger," Swidler said. "It should top out at 60 million messages within the next 24 hours."
Worse, the malware bundled with the spam is self-replicating, so it's able to sniff out email addresses on infected PCs and send copies of itself to those recipients. "There will be a fair number of additional infections," Swidler said. He warned that even when the spam campaign exhausts itself, the newly-compromised computers might be able to sustain large quantities of spam on their own.
The spam blast also includes a host of randomisation and anti-detection features, other researchers said. "Emails are randomised with different filenames, different passwords and different binaries within the ZIP file to evade detection," Ken Dunham, director of VeriSign's iDefense rapid response team, said in an email. "And once executed, the worm communicates over a private peer-to-peer (P2P) network to update itself."
The latter is a long-time characteristic of the Storm Trojan family.
Because the Storm Trojan has been assigned several different names by anti-virus vendors, it's difficult to determine which security companies reacted first. Some, however, have already created new signatures to sniff out the malicious payload. Symantec, for example, noted the new strain on its website, but said there that it won't update customers with the detection fingerprint until Friday.
That may be too late for some users.
"It is highly likely that this latest attack will result in many more downloads, pump-and-dump attacks and more, as seen with former Storm Worm attacks," Dunham said.