Storm Botnet: The Notorious Cyber Threat & Its Impact

YamunadeviK2 5 views 15 slides Feb 19, 2025
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

"This presentation explores the Storm Botnet, one of the most infamous botnets in cybersecurity history. It covers its architecture, propagation methods, impact, and how it was eventually dismantled. "


Slide Content

Storm Botnet Malware……Be Aware By K.Yamuna Devi P. Yuvamanimuthu

What is Botnet? A group of computers are get connected together for a malicious purposes Each computer in botnet is called as a bots. These forms a compromised network controlled by a third person to transmit the malware A botnet is also be a zombie army  

Storm Botnet The storm botnet is a malware send through e-mail without the knowledge of user. Storm is indeed a worm because once it infiltrates a PC it can access the e-mail client’s address book and send spam to those addresses that point to a server that downloads more Storm .

Storm worm cyclic process

When it spread.. The Storm Worm began attacking thousands of (mostly private) computers in Europe and the United States. It mostly affects computers using Microsoft operating systems It was first identified around January 2007, having been distributed by email with subjects such as " 230 dead as storm batters Europe ," giving it its well-known name.

Storm May also a Trojan Horse In computing, a Trojan horse or Trojan is any malicious computer program which misleads users of its true intent . Is a Program that pretends to do one thing in front of the user but does something behind the scenes The affected computers become vulnerable to remote control by the person behind the attack Hacker use the bots to send spam mail across the internet Such botnet may create zombie army(zombie computer)

How S torm Worm is created in our PC..? Malicious websites designed specifically to inject Trojans. By selecting an fake e-mail messages with a links . Fake updates presented for installed software. Free Downloadable games. Social Links Pointing to infected files or websites.

Example

Symptoms…. Unnatural network activities: You might experience unnatural network activities resulting into slow network ( Internet) Registry modifications: Storm worm attempts to add new registry entries and modify existing ones. As a result, you will gradually notice slow and unusual computer behavior. Change in browser settings: Your Internet access slows down and unwanted websites keep getting loaded through pop-ups or directly in the active browser window. Slow computer: You might experience your computer booting up slowly, due to unknown startup programs downloaded by Storm worm.

How to Remove..? There are many removal tools already available that can remove the Storm Worm. These tools include Microsoft Safety Scanner and Sophos Virus Removal Tool. Most security products with real-time protection are able to detect and automatically get rid of the worm.

Removal Tools DE-Cleaner powered by Avira DE-Cleaner powered by Kaspersky RuBotted Mirage Anti-Bot Bot Revolt Norton Power Eraser

When it declined… This is a freely distributed virus removal tool developed by Microsoft for MS windows operating systems It scans the computer for specific widespread malware and tries to eliminate the infection The botnet began to decline in late 2007, and by mid-2008, had been reduced to infecting about 85,000 computers, far less than it had infected a year earlier .

Conclusion Be aware with unknown websites and e-mails. Updated with news about malware.