SlideShare uma empresa Scribd logo
1 de 12
Stormy Weather
A quantitative assessment of the Storm web threat in 2007
  q

Raimund Genes, Anthony Arrott, and David Sancho
Trend Micro




VB2008 - Ottawa                 October 2008
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 Storm activity by country of IP source




VB2008 - Ottawa   October 2008   2                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 How does Storm infect computers?
 •       Users open executable email attachments
         (e.g. ‘Full Story.exe’)

         or

 •       Users visit infected websites
         (e.g. ‘click_for_full_story’)


 •       Either way, user click results in becoming a remotely-controlled
         botnet zombie




VB2008 - Ottawa   October 2008   3                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 What does Storm do to make money for its perpetrators?

 •       ‘Botnets for rent’ in underground economy

 •       Rented botnets used:
         –        as spam engines
         –        in denial of service attacks

 •       Sell mined zombie data (e.g. address book contents)




VB2008 - Ottawa      October 2008   4              Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 How does Storm protect itself from detection & removal?
 •       Infects host zombies with rootkits

 •       Provides periodic updates of malware code

 •       Botnets configured
         –        decentralized control
         –        rotating activation
         –        enhanced encryption
                           encr ption
         –        frequent code replacement




VB2008 - Ottawa      October 2008   5              Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007



 Storm outbreaks in 2007
         – 17 Jan 07 – “European Storm” Spam
         – 12 Apr 07 – “Worm Alert” Spam
         – 27 Jun 07 – “E-card” (applet.exe)
         – 4 July 07 – “231st B-day”
         – 2 Sep 07 – “Labor Day” (labor.exe)
         – 5 Sep 07 – “Tor Proxy”
                       Tor Proxy
         – 10 Sep 07 – “NFL Tracker”
         – 17 S 07 – “A d G
              Sep    “Arcade Games”
                                  ”

                                                       Adopted from: Porras Saidi & Yagneswaran
                                                                     Porras,


VB2008 - Ottawa   October 2008   6                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                  spam




VB2008 - Ottawa   October 2008   7                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                                                       source: Trend Micro


VB2008 - Ottawa   October 2008   8                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                             spam volume




VB2008 - Ottawa   October 2008   9                 Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




VB2008 - Ottawa   October 2008   10                Copyright 2008 - Trend Micro Inc.
Stormy Weather
  A quantitative assessment of the Storm web threat in 2007




                                                                                       ?

VB2008 - Ottawa   October 2008   11                Copyright 2008 - Trend Micro Inc.
Thank you




VB2008 - Ottawa   October 2008

Mais conteúdo relacionado

Semelhante a Stormy Weather

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Andris Soroka
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS IntroductionKae Hsu
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTeleport
 
McAfee Vulnerability Manager
McAfee Vulnerability ManagerMcAfee Vulnerability Manager
McAfee Vulnerability ManagerDragos Lungu
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...VirtSGR
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneckAnthony Arrott
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011Agora Group
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsTrend Micro (EMEA) Limited
 
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat Security Conference
 
Future of Destructive Malware
Future of Destructive MalwareFuture of Destructive Malware
Future of Destructive MalwareGreg Foss
 

Semelhante a Stormy Weather (20)

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010Radware - DSS @Vilnius 2010
Radware - DSS @Vilnius 2010
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Stormy Weather
Stormy WeatherStormy Weather
Stormy Weather
 
Top 10 Hacks of the Last Decade
Top 10 Hacks of the Last DecadeTop 10 Hacks of the Last Decade
Top 10 Hacks of the Last Decade
 
McAfee Vulnerability Manager
McAfee Vulnerability ManagerMcAfee Vulnerability Manager
McAfee Vulnerability Manager
 
Top Ten Hacks of 2007
Top Ten Hacks of 2007Top Ten Hacks of 2007
Top Ten Hacks of 2007
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
 
STUXNET_
STUXNET_STUXNET_
STUXNET_
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneck
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs realityBlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
 
Future of Destructive Malware
Future of Destructive MalwareFuture of Destructive Malware
Future of Destructive Malware
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Stormy Weather

  • 1. Stormy Weather A quantitative assessment of the Storm web threat in 2007 q Raimund Genes, Anthony Arrott, and David Sancho Trend Micro VB2008 - Ottawa October 2008
  • 2. Stormy Weather A quantitative assessment of the Storm web threat in 2007 Storm activity by country of IP source VB2008 - Ottawa October 2008 2 Copyright 2008 - Trend Micro Inc.
  • 3. Stormy Weather A quantitative assessment of the Storm web threat in 2007 How does Storm infect computers? • Users open executable email attachments (e.g. ‘Full Story.exe’) or • Users visit infected websites (e.g. ‘click_for_full_story’) • Either way, user click results in becoming a remotely-controlled botnet zombie VB2008 - Ottawa October 2008 3 Copyright 2008 - Trend Micro Inc.
  • 4. Stormy Weather A quantitative assessment of the Storm web threat in 2007 What does Storm do to make money for its perpetrators? • ‘Botnets for rent’ in underground economy • Rented botnets used: – as spam engines – in denial of service attacks • Sell mined zombie data (e.g. address book contents) VB2008 - Ottawa October 2008 4 Copyright 2008 - Trend Micro Inc.
  • 5. Stormy Weather A quantitative assessment of the Storm web threat in 2007 How does Storm protect itself from detection & removal? • Infects host zombies with rootkits • Provides periodic updates of malware code • Botnets configured – decentralized control – rotating activation – enhanced encryption encr ption – frequent code replacement VB2008 - Ottawa October 2008 5 Copyright 2008 - Trend Micro Inc.
  • 6. Stormy Weather A quantitative assessment of the Storm web threat in 2007 Storm outbreaks in 2007 – 17 Jan 07 – “European Storm” Spam – 12 Apr 07 – “Worm Alert” Spam – 27 Jun 07 – “E-card” (applet.exe) – 4 July 07 – “231st B-day” – 2 Sep 07 – “Labor Day” (labor.exe) – 5 Sep 07 – “Tor Proxy” Tor Proxy – 10 Sep 07 – “NFL Tracker” – 17 S 07 – “A d G Sep “Arcade Games” ” Adopted from: Porras Saidi & Yagneswaran Porras, VB2008 - Ottawa October 2008 6 Copyright 2008 - Trend Micro Inc.
  • 7. Stormy Weather A quantitative assessment of the Storm web threat in 2007 spam VB2008 - Ottawa October 2008 7 Copyright 2008 - Trend Micro Inc.
  • 8. Stormy Weather A quantitative assessment of the Storm web threat in 2007 source: Trend Micro VB2008 - Ottawa October 2008 8 Copyright 2008 - Trend Micro Inc.
  • 9. Stormy Weather A quantitative assessment of the Storm web threat in 2007 spam volume VB2008 - Ottawa October 2008 9 Copyright 2008 - Trend Micro Inc.
  • 10. Stormy Weather A quantitative assessment of the Storm web threat in 2007 VB2008 - Ottawa October 2008 10 Copyright 2008 - Trend Micro Inc.
  • 11. Stormy Weather A quantitative assessment of the Storm web threat in 2007 ? VB2008 - Ottawa October 2008 11 Copyright 2008 - Trend Micro Inc.
  • 12. Thank you VB2008 - Ottawa October 2008