“The teams at Berkley and UCSD conducted the experiment by
impersonating a key component of the Storm worm network used to
hand off instructions from the worm’s master control servers to the
“worker bots” — the tens of thousands of infected end-user systems
that do all the spamming.“This allowed them to redirect a subset of the spam to virtual
storefronts created by the researchers to mimic the pharmaceutical
Web sites advertised by the real Storm spam.”
Researchers Hijack Storm Worm to Track Profits
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis