The Valentine’s Day campaign that the bot-building Storm Trojan has been running for weeks is running at such volume that even the FBI issued a warning Tuesday.“With the holiday approaching, be on the lookout for spam e-mails spreading the Storm Worm malicious software,” the FBI said in an alert posted to the home page of its Web site Wednesday. “The Storm Worm virus has capitalized on various holidays in the last year by sending millions of e-mails advertising an e-card link within the text of the spam e-mail. Valentine’s Day has been identified as the next target.”Actually, the FBI was way behind the ball. For several weeks, security vendors have been predicting that Storm would again use tomorrow’s big day to dupe users into opening attachments or clicking links.A month ago, for example, Sophos noted that Storm’s spam blasts — messages with subject heads like “You’re the One” and “Falling in Love with You” — were already accounting for 1 in every 12 e-mails counted by the company’s filters. The messages included an IP-address-only link that led, said Sophos senior security analyst Mike Haro, to any of several already-compromised computers in the Storm botnet. Those PCs, of course, tried to infect visiting machines with an up-to-date copy of the Trojan, which in turn added them to the malware’s army. This is the second year running that Storm has exploited Valentine’s Day. Last year, the botnet Trojan was relatively new — it made its first splash the month before — and researchers have long expected its author or authors to return to the holiday in 2008. In mid-January, for instance, Jamz Yaneza, research project manager at Trend Micro Inc., said early versions of 2008’s run showed that the Trojan’s makers had learned from the malware’s past.“This year’s version looks like a stripped-down version of last year’s,” he said in an interview last month about Storm’s one-year anniversary. “They’ve optimized the way [the bot’s delivered] over the past months,” he said, citing an example of how this year’s Valentine’s campaign would differ from 2007’s. “They’ve learned that there’s no need to add an attachment.” That’s exactly how things have played out in the days leading to Feb. 14.Trend Micro David Sancho spelled it out in a post to the company’s blog on Monday. “The spammed e-mail messages are just plain text, but contain links that lead to malicious Web sites displaying one of eight cute Valentine images,” Sancho said. His post cycled through the images Trend Micro captured from the malware-serving sites.“If you run the executable named ’valentine.exe,’ your system will join the Storm botnet to start spamming other Internet users,” Sancho concluded. “Not very loving of them.”By Gregg Keizer, Computerworld Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe