News Stay informed about the latest enterprise technology news and product updates.

“Storm” Trojan re-emerges in hard-to-stop variant with several potential payloads

Secure Computing Corp. has warned that the Storm Trojan horse has re-emerged, after having appeared in January and largely faded from view.

The Trojan usually arrives in e-mail, then installs itself as a rootkit, using operating-system functions to capture Web traffic. It detects when a user appears to be posting a comment to a blog, then inserts a linethat asks readers to look at “a fun video.” Clicking on the link takes a victim to a malware site where keyloggers or remote-control software can be dropped on the machine.

The variant is hard to isolate, partly because it changes its form every time it’s downloaded.

Secure Computing recommends looking at videos only on known sites, such as YouTube, instead of following links, even from postings that appear to be from a known source.

The full version of this story appeared on TechTarget sister site SearchSecurity.com.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close