Welcome!

Machine Learning Authors: Ed Featherston, Elizabeth White, Dan Blacharski, Liz McMillan, William Schmarzo

News Feed Item

Second Massive Email Virus Attack in a Month Portends Explosive Growth in Fraud, Theft, Spam and Viruses

Storm Worm Drives Volume of Email Viruses on the Internet Upward by a Factor of 20

SAN CARLOS, Calif., Jan. 29 /PRNewswire/ -- Postini, the global leader in on-demand communications security, compliance and productivity solutions for email, instant messaging and the web, today announced that hackers and spammers are raising their onslaught in 2007 as witnessed by two massive, global email-borne virus attacks which took place from December 29 to December 31, 2006 and again from January 19 to January 21, 2007. Each of these attacks was so large that they drove up the level of viruses on the Internet up by a factor of 20 over usual activity.

Both attacks were designed to steal personal information and hijack the recipient's computer to add to ever growing "bot-nets" - massive networks of infected personal computers used to distribute spam and virus attacks. The size and sophistication of these back to back attacks implies that spam and virus levels on the Internet, which are already at all-time highs, will continue to rise as newly hijacked computers are brought into action and begin spewing even more spam and viruses.

This latest attack has become known as the Storm worm because the original email subject line was, "230 dead as storm batters Europe". At the time of the email, there in fact was actually a heavy winter storm occurring in Europe. This is the latest example of the attackers' sophistication and real- time capabilities, launching the attack and timing it to coincide with real news about the storm. The email that contained the virus frequently mutated to show dozens of different fake, sensational but believable headlines designed to tempt the reader into clicking on an attachment and thus infecting their computer. Other subjects included, "Russian missile shot down USA aircraft" and "Saddam Hussein alive!"

The infectious email had a file attachment that contained a trojan horse virus known as Downloader-BAI or AUTH-W32/Downloader. If a person clicks on the attachment, their computer will become infected with the virus which then attempts to send personal information (including email addresses, financial information and credit card information) from that computer back to the hackers who created the virus. They can then use this information for identity theft or sell it to others. The virus also provides a back-door for hackers to take control of the computer and add it to a bot-net to be used in future spam and virus attacks. This attack also illustrated the escalating vicious cycle of spam and viruses being fueled by and creating bot-nets. The virus was distributed by email, which was sent from bot-net zombies that had been infected by previous email-borne viruses and the intent of the virus was to infect even more computers and turn them into larger bot-net zombie network to use in future spam and virus attacks. The email subject, content and virus all mutated many times over the course of the outbreak in an attempt to evade detection. Anti-virus engine providers had to issue several signature updates throughout the outbreak.

As the virus attack began, Postini's PREEMPT email protection service immediately began blocking the worm. Over the three day period, Postini stopped more than 29 million infected messages from reaching the 36,000 businesses Postini provides email security services for. On January 20, 2007 alone, Postini blocked almost 17 million infected email messages, nearly 20 times the average daily virus volume in 2006.

The January 2007 Storm worm follows on the heels of another email-borne virus, the Happy New Year worm, which attacked the Internet in late December 2006. The Happy New Year worm contained a subject line and an attachment exploiting the expectations of legitimate postcards and greetings from friends and families. The infected attachment contained numerous strains of malicious code (including Tibs, Nuwar, Banwarum, and Glowa) as well as two root kits designed to hide the presence of the malicious code from anti-virus scans. Ultimately, the goal of the Happy New Year worm was to create more zombie computers that could be added to bot-nets and used for additional spamming and other attacks.

Starting on December 28, 2006, Internet virus volumes began to dramatically increase and Postini PREEMPT email protection began blocking infected messages. At the peak of the outbreak on December 30, 2006, Postini blocked 19.5 million messages infected with the Happy New Year worm and its variants.

These two attacks were by far the largest to occur in the past 12 months. "The explosion of bot-nets, millions of infected computers controlled by malicious actors around the world, has changed the balance of power in the world communications security," said Daniel Druker, executive vice president of marketing at Postini. "As Valentines Day approaches, email users should continue to keep their guard up, as there are already new mutations of the Storm worm with love-related subject lines."

About Postini

Postini is the global leader in on-demand communications security, compliance and productivity solutions for email, instant messaging and the web. Postini offers an award-winning suite of on-demand services for electronic communications, including protection from viruses, spam, phishing, fraud and other attacks, secure messaging, and archiving, discovery and production of electronic messages. The company's powerful on-demand infrastructure integrates with customers' environments, providing security, compliance and productivity solutions for more companies than any other provider in the world. Postini's services are designed to protect organizations from a wide range of threats, reduce compliance and legal risks, ensure reliable communications, and enable the intelligent management and enforcement of enterprise policies that protect companies' intellectual property, reputations and business relationships. For more information please contact Postini at [email protected] or visit http://www.postini.com/ .

Media Contacts: Marty Tacktill Postini (650) 486-8269 [email protected] Derek Kober GlobalFluency (650) 433-4233 [email protected]

Postini

CONTACT: Marty Tacktill of Postini, +1-650-486-8269, or
[email protected]; or Derek Kober of GlobalFluency, +1-650-433-4233, or
[email protected]

Web site: http://www.postini.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
The need for greater agility and scalability necessitated the digital transformation in the form of following equation: monolithic to microservices to serverless architecture (FaaS). To keep up with the cut-throat competition, the organisations need to update their technology stack to make software development their differentiating factor. Thus microservices architecture emerged as a potential method to provide development teams with greater flexibility and other advantages, such as the abili...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
The cloud era has reached the stage where it is no longer a question of whether a company should migrate, but when. Enterprises have embraced the outsourcing of where their various applications are stored and who manages them, saving significant investment along the way. Plus, the cloud has become a defining competitive edge. Companies that fail to successfully adapt risk failure. The media, of course, continues to extol the virtues of the cloud, including how easy it is to get there. Migrating...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they responded to were some very unique security capabilities that we have," explained Mark Figley, Director of LinuxONE Offerings at IBM, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he covered some of the best practices for structured team migration an...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...