A researcher at the Internet Storm Center said the widespread but unfocused attack could have been a test of the might of a botnet more than 1.7 million zombies strong.
Researchers are blaming the virulent Storm worm for a widespread denial-of-service attack that hit Canadian Web sites over the weekend.
The attack may have been unfocused and unsuccessful, but it could have been an early test of the denial-of-service power that the Storm worm botnet now holds.
Johannes Ullrich, chief research officer at the SANS Institute and CTO for the Internet Storm Center, said in an interview that while sites in Canada were "pounded" over the weekend, he doesn't think it was a targeted denial-of-service attack. The attacks weren't aimed at any particular Web sites. It was just spread across a wide swath of the Internet.
"The DoS part was basically an unintentional side effect," said Ullrich. "It was a whole lot of spam -- enough to make the servers slow down. Once [that much spam] is set loose, it's hard to tell what's going to happen."
This weekend's attack veered off the norm.
The Storm worm has been buffeting the Internet for the past several months, sending out historic levels of spam e-mail. Much of it has been in the form of phony electronic greeting cards, luring unsuspecting users to malicious Web sites where their machines are infected with malware that turns them into bots. The individual zombie machines are then added to the massive botnet that the Storm worm authors have been putting together.
This latest attack, though, didn't use the e-card ruse. The e-mails in the attack also didn't carry any malware and didn't link to or point users to any malicious Web sites. The limited amount of text in the e-mails was little more than gibberish, according to Ullrich.
"They may have been trying something but it didn't work," said Ullrich. "Sure. It definitely could be a test [of a DoS attack]. That's what you'd expect. They generally try a test-run first."
Researchers at both SecureWorks and Postini said they think the Storm worm authors are cultivating such an enormous botnet to do more than send out increasing amounts of spam. All of the bots are set up to launch DoS attacks and that's exactly what they're anticipating. Denial-of-service attacks are designed to pound each computer with countless questions that flood its ability to respond, effectively taking the machine down.
Ullrich said on Monday that he too is concerned about what a botnet of this size could do if the Storm worm authors decide to target a DoS attack. However, he said the authors seem very focused on making money and unless they plan on extorting a company with threats of a massive denial-of-service attack, where's the financial motive?
Ullrich added that he's been seeing Storm worm ads on various underground Web sites. The authors are advertising their ability to send out pump-and-dump and pharmaceutical spam with their global botnet.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.