Virus: Storm Worm.
Example: [Collected via e-mail, 2007]
Subj: 230 dead as storm batters Europe
Origins: The “Storm Worm” (so named because the spam e-mail messages that carried it commonly bore the subject line
Win32.Small.DAM, a variant of Win32.Small) affects most Windows-based platforms (i.e., Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP)
and is spread as an attachment to
The Storm Worm may arrive in a message with any of the following subject lines (intended to lure the recipient into reading the message by offering a political headline of great interest):
- F.B.I. vs. Facebook
- Strongest earthquake hits Beijing
- Death toll in China exceeds 1000000
- Recent china earthquake kills million
- 230 dead as storm batters Europe.
- A killer at 11, he’s free at 21 and…
- British Muslims Genocide
- Naked teens attack home director.
- U.S. Secretary of State Condoleezza Rice has kicked German Chancellor Angela Merkel
- Russian missle shot down Chinese satellite
- Russian missle shot down USA aircraft
- Russian missle shot down USA satellite
- Chinese missile shot down USA aircraft
- Chinese missile shot down USA satellite
- Sadam Hussein alive!
- Sadam Hussein safe and sound!
- Radical Muslim drinking enemies’ blood.
- U.S. Southwest braces for another winter blast. More then 1000 people are dead.
- Venezuelan leader: “Let’s the War beginning”.
- Hugo Chavez dead.
- President of Russia Putin dead.
- Third World War just have started!.
- The Supreme Court has been attacked by terrorists. Sen. Mark Dayton dead!.
- The commander of a U.S. nuclear submarine lunch the rocket by mistake..
- First Nuclear Act of Terrorism!.
- So in Love
- Happy World Religion Day!
- Most Beautiful Girl
- Someone at Last
- I Believe
- The Dance of Love
- The Miracle of Love
- All For You
- Vacation Love
- I am Complete
- Wrapped Up
- Moonlit Waterfall
- A Little (sex) Card
- A Special Kiss
- Hugging My Pillow
- Safe and Sound
- You’re Soo kissable
- A Romantic Place
- Breakfast in Bed Coupon
- For You
- I Love You So
- Want to Meet?
- We Are Different
- We Have Walked
- You Asked Me Why
The attachment filename may be any of the following:
- Full Clip.exe
- Full Story.exe
- Read More.exe
- Full Video.exe
- Full Text.exe
- Flash Postcard.exe
In April 2007 a new variant of Trojan.Peacomm was unleashed on the Internet, this one varying from the previous “Storm worm” attack in that the attachments carrying the payload were password-protected .ZIP files (which recipients were tricked into unzipping and running to putatively protect themselves from some other worm). E-mails containing this variant typically had subject lines such as the following:
- Spyware Alert!
- Spyware Detected!
- Trojan Alert!
- Trojan Detected!
- Virus Activity Detected!
- Virus Alert!
- Virus Detected!
- Worm Activity Detected!
The underlying worm is the same one that has appeared in messages with subject lines as “You’ve received an e-card from an admirer,” the
“Laughing Kitty,” the “Dancing Skeleton,” as well as several game and music download offers. According to spamtrackers.eu:
from a server simultaneously. The entire country of Estonia was brought Storm is a serious threat for several reasons. It communicates Since antivirus programs will not protect your computer, the most
The storm network is large enough to cut off internet access from any
institution its operators choose to attack via a “distributed denial of
service attack,” in which hundreds or thousands of computers request files
down that way last year. The network is actually available for rent for
anyone who wishes to use it to send spam, host illegal websites, or stage
denial of service attacks.
“peer-to-peer” instead of via a “command and control” network. For that
reason, you can’t just disable a few computers that are feeding
instructions to the others. The virus download is encrypted, so it is
difficult for antivirus programs to recognize, and infected computers are
updated by the peer network on a daily basis to keep antivirus programs
from recognizing it once they are updated to recognize previous editions
of the virus. The number of
infections worldwide is massive, and a quarter of them are on major
networks in the US like SBC, Comcast, and Roadrunner. That means that a
bank or other business under denial of service attack can’t simply block
all traffic from certain segments of the internet, because it would be
blocking its own users that are sharing those same internet addresses with
storm infected computers as they log in and out of the internet. It is
believed that Storm’s operators are located in St. Petersburg, Russia, are
known to the Russian government, and enjoy its protection.
important thing is for people to be extremely suspicious about where they
go and what they click on. Never click on any link in an email from
someone you don’t know. Never click on a link in an advertisement on the
from a server simultaneously. The entire country of Estonia was brought
Storm is a serious threat for several reasons. It communicates
Since antivirus programs will not protect your computer, the most
Additional information on the Storm Worm (including disinfection/removal instructions) may be found at
Last updated: 1 August 2008
A Word to Our Loyal Readers
Support Snopes and make a difference for readers everywhere.
- David Mikkelson
- Doreen Marchionni
- David Emery
- Bond Huberman
- Jordan Liles
- Alex Kasprak
- Dan Evon
- Dan MacGuill
- Bethania Palma
- Liz Donaldson
- Vinny Green
- Ryan Miller
- Chris Reilly
- Chad Ort
- Elyssa Young
Most Snopes assignments begin when readers ask us, “Is this true?” Those tips launch our fact-checkers on sprints across a vast range of political, scientific, legal, historical, and visual information. We investigate as thoroughly and quickly as possible and relay what we learn. Then another question arrives, and the race starts again.
We do this work every day at no cost to you, but it is far from free to produce, and we cannot afford to slow down. To ensure Snopes endures — and grows to serve more readers — we need a different kind of tip: We need your financial support.
Support Snopes so we continue to pursue the facts — for you and anyone searching for answers.