The Storm winds down, but new malware on the up
Malicious software removal tools have cut down Storm botnet numbers, but does this simply mean that criminals will migrate to new threats?

The Storm has dramatically calmed this April, with a MessageLabs report claiming that the Storm botnet was now only at five per cent of its original size.
Storm had been estimated at having compromised two million computers, but there was a 57 per cent decrease in malware-laden emails distributed by the Storm botnet during April.
MessageLabs suggested that the introduction of new malicious software tools which aimed to target and remove Storm infections may have been responsible. Microsoft's Malicious Software Removal Tool had recently been updated for this purpose.
But it wasn't all good news, as the same report said that web-based malware had increased by 23 per cent, with cyber criminals taking advantage of users unfamiliar with the web threat.
Analysis showed that 36.1 per cent of interceptions in April were new, with an average or 1,214 new websites per day harbouring malware, spyware or adware. This was an increase of 619 per day compared to March.
"April was a month of unpredictability with the mighty Storm botnet losing all but five per cent of its anonymous army and web-based malware reaching new levels," said Mark Sunner, chief security analyst at MessageLabs.
The report said that a new botnet called Srizbi, which showed up in 2007, had the potential to overtake Storm as the most notorious botnet.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Of the new threats, Sunner said: "This month we find ourselves fighting the cybercrime battle on many fronts, with the bad guys using an arsenal of weapons in order to detonate spam, viruses, phishing attacks and targeted Trojans."
In the week of the 30th anniversary of the first spam message, MessageLabs also reported on a new spamming technique which was being used to send authenticated spam email through Yahoo SMTP servers.
It accounted for one per cent of all spam intercepted in April, advertising services for Canadian Pharmacy, which the company said were well known for spamming.
It used the SMTP server and a DomainKeys Identified Mail (DKIM) authentication technique which ensured that the email was harder to block.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott
-
Horabot campaign targeted businesses for more than two years before finally being discovered
News The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
By Ross Kelly
-
Brand-new Emotet campaign socially engineers its way from detection
News This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
By Ross Kelly
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomware
News The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
By Connor Jones
-
Beating the bad bots: Six ways to identify and block spam traffic
In-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
By Sead Fadilpašić
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia
News The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
By Connor Jones
-
Microsoft's secure VBA macro rules already being bypassed by hackers
News Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
By Connor Jones
-
Emotet infrastructure has almost doubled since resurgence was confirmed
News Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation
By Connor Jones