Resurgent Storm worm attacks over Web

The Storm worm which first surfaced in January is on the rise, but this time round the attack is delivered over the Web.

The Storm worm which first surfaced in January is on the rise, but this time round the attack is delivered over the Web.

Unsuspecting computer users are tricked into clicking on the links in e-mails, often in the form of e-cards, and get infected when they visit Web sites containing the Storm worm.

Jim Dowling, director of Asia sales at Sophos, said in an e-mail on Friday that the new campaigns have been "just as prevalent as the earlier Storm Trojan campaigns".

The antivirus company has detected that "6.3 percent of all spam in the last 48 hours [is] related to e-card spam", Dowling added.

The United States Computer Emergency Readiness Team (US-CERT) posted a message on its Web site several days ago, warning Web users about the Storm worm which, it said, is "currently on the rise".

A check with Symantec confirmed the resurgence, but the company spokesperson told said that it has "not registered much new activity".

One security vendor that has not given the Storm worm a high-alert ranking is McAfee. A company spokesperson said it "has not seen any reports on the Storm worm" and has rated it "low profile".

The Storm worm first emerged in January as an executable file attachment within e-mails, and was recorded as one of the larger Trojan-horse attacks of recent years.