Researchers disassembling the client of the Storm worm discovered that the peer-to-peer protocol it uses for controlling zombies is in no way authenticated. Anyone can set up a control server and route zombies to it.
The researchers considered setting up a control server which would instruct the zombies to remove the Storm worm from themselves, but were too worried about the legal/ethical implications.
The researchers considered setting up a control server which would instruct the zombies to remove the Storm worm from themselves, but were too worried about the legal/ethical implications.
Comment