Spam trumpeting the power of love is nothing more than an old trick dressed up in new clothes, more evidence that the backers of the Waledec bot Trojan are the same bunch that hammered users in 2007 with Storm, security companies are warning.
Multiple security vendors, including MX Logic Inc., Trend Micro Inc., and Panda Security, have issued alerts about new Valentine's Day-themed spam campaigns that try to dupe users into installing the Waledec bot.
Subject lines for the spam, said Sam Masiello , vice president of information security at MX Logic, are "short and sweet," and include "Me and You," "In Your Arms" and "With all my love." From the spam, users who browse to the embedded link reach a site with a dozen hearts, any one of which download an executable file when clicked.
Masiello first noted the campaign last Thursday, but other researchers, including those at Trend Micro and Panda, picked up on the trend Monday. Both Masiello and Florabel Baetiong, an anti-spam research engineer with Trend, noted the similarity between the recent infection attempt and Valentine's Day scams launched last year by hackers controlling Storm, another bot Trojan that has since fallen into disuse, possibly because the crew responsible surrendered to heavy pressure by security experts .
"Clearly the old Storm folks are working as hard as they can to build up their new botnet, and are following the old tried-and-true methods of centering their social engineering tactics around holiday themes," said Masiello in a post to the MX Logic blog .
Storm used Valentine's Day spam in both 2007 and 2008 to hijack PCs.
Most researchers have come around to the idea that Waledec is, in fact, the new Storm. Joe Stewart , an expert on botnets -- Storm, in particular -- was confident that the group that backed Storm essentially re-wrote its code to come up with Waledec. "If it's not the same people, they would have had to study Storm intensively to match the functionality," Stewart said in an interview recently. "It's so similar that it's unlikely to be a different group."
The Waldec malware first began infecting systems just before Christmas , when it used phony holiday greetings and e-cards as bait, another Storm tactic during 2008. Last week, it surfaced again, this time hitchhiking on a spam run that claimed then President-elect Barack Obama would not take the oath of office on Jan. 20.
Although the Waledec botnet remains relatively small -- Stewart put it at just 10,000 machines -- it's growing at "an alarming rate," according to MessageLabs Ltd. In a report on botnets the e-mail security company released Monday (download PDF) , MessageLabs speculated that the botnet owners are "focusing on growing and developing this new botnet, rather than sending spam through it at this stage."
Masiello said that messages designed to plant Waledec were running at a volume of about 4,000-5,000 per hour, down from approximately 12,000 an hour last Friday, and had been holding steady for the last 48 hours. "I'd agree with MessageLabs," said Masiello on Tuesday. "It does look like they are in the process of building up the botnet." MX Logic has not seen any evidence that the Waledec botnet is, in turn, sending spam of its own.
Several botnets that were heavily disrupted by the takedown of McColo Corp., a California-based hosting company, are in the same condition, Masiello added. After suffering losses when McColo -- which had hosted command-and-control servers for several botnets, particular one dubbed "Srizbi" and other called "Rustock" -- was yanked off the Internet, they have spent the last several months adding new PCs to their collection.