The new variant of the Storm Worm virus is spreading through the Internet

Information about a second variant of Small Trojan, also known as Storm Worm. Like the previous variant, this variant is also a mail bomber using a shared network to spread. The variant of Hurricane Worm created a peer network that operates on port 7871 / UDP. D & atil variants

Information about a second variant of Small Trojan, also known as Storm Worm. Like the previous variant, this variant is also a mail bomber using a shared network to spread. The variant of Hurricane Worm created a peer network that operates on port 7871 / UDP. Variations have been previously reported as Small.DAM or Trojan.Peacomm works on port 4000 / UDP.

Small Trojan variants penetrate through an email attachment and also spread through a network share. These variants leave two files, one including its rootkit function. These variants create a spyware that can be used to collect sensitive information or launch a spam attack.

Usually they will send you an email with the following title: (However, the subject lines may change at any time and we will update the new titles after further discovery).

• 230 dead as storm batters Europe
• A killer at 11, he's free at 21 and .
• British Muslims Genocide
• Naked teens attack home director
• US Secretary of State Condoleezza .
• Russian missle shot down Chinese satellite
• Russian missle shot down USA aircraft
• Russian missle shot down USA satellite
• Chinese missile shot down USA aircraft
• Chinese missile shot down USA satellite
• Sadam Hussein alive!
• Sadam Hussein safe and sound!
• Radical Muslim drinking enemies' blood

File names can also be changed at any time, but they are currently using file names for below:

• Full Clip.exe
• Full Story.exe
• Full Video.exe
• Full Text.exe
• Full Story.exe
• Read More.exe
• Video.exe

We recommend that you and your administrators check the prevention to reduce unnecessary risks according to the instructions below:

• Install antivirus software and always upgrade new viruses.
• Block file types that are not understood and can be executed at the email gateway.
• Do not download or read emails attached to such titles or emails of unknown origin

Update 13 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment