Information Warfare: There's a Nuke on the Net


August 20, 2007: Cyber War professionals are watching with great interest the progress of the Storm botnet. This is the largest botnet ever seen, and it is acting like something out of a science fiction story. The Storm computer virus had been spreading since early in the year, grabbing control of PCs around the world. By August, Storm had infected nearly two million computers with a secret program that turned those PCs into unwilling slaves (or "zombies") of those controlling this network (or botnet) of computers. Many of you may have noticed a lot of recent spam directing you to look at an online greeting card, or accompanied by pdf files. That was Storm, the largest single spam campaign ever. When you try to look at the PDF file, Storm secretly takes over your computer. Anti-virus programs are disabled and Storm tries very hard to hide itself. All it wants to do is use your Internet connection to send spam, or other types of malicious data.

To avoid the police (especially the U.S. FBI), many botherders (those who operate botnets) are usually in countries without an extradition treaty with the United States, where nearly half the zombie PCs are. Criminal gangs are increasingly active in producing things like Storm, and, in the case of China, so are government Cyber War operations. It's unclear who is controlling the two million Storm zombies, but it's becoming clear what Storm is up to. It has been launching attacks at web sites involved in stopping or investigating Storm. This involves transmitting huge quantities of bogus messages ,that shut down targeted web sites (this is a DDOS, or distributed denial or service attack). The Storm botherders are also advertising their botnet as available for the usual illegal activities (various types of spam).

But the most alarming aspect of all this is the sheer size of the Storm botnet. It's quite possible that it's not all one, huge, two million PC botnet. There may be several owners, who simply used variations of the basic Storm virus (which showed up last February, using as a lure the promise of news about the huge Winter storms then lashing Europe, and thus got its name.)

Police and Cyber War organizations are certainly trying to track down who controls Storm, mainly in self-defense. A botnet that large could shut down major sites, or large chunks of the Internet itself. The Storm is the Internet equivalent of a nuclear weapon, and no one is sure who controls it.


Article Archive

Information Warfare: Current 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 



Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close