“Storm uses complex programming techniques to automatically repackage itself,” remarked Randy Abrams, director of technical education at ESET. “It’s a bit like someone changing their costume at a party every five minutes. Inside it is the same, but outside it looks different. … The Storm authors look at how they are being detected and then devise counter attacks.”It’s not a comforting thought, but while you’re sleeping peacefully, your PC may be hard at work acting as a spam server See the HP Proliant DL380 G5 Server with Systems Insight Manager – Click here. or peer-to-peer node, providing processing power to a malware network See the HP StorageWorks All-in-One Storage System. Click here. engaging in any of a variety of criminal activities online.Spam is being used by botnet operators in a multiplicity of new forms — such as those behind the now prolific Storm spam-malware hybrid — to build distributed robot networks, or botnets, made up of spam recipients’ enslaved “zombie” PCs. Taken together, the zombie armies provide raw processing power rivaling, and sometimes even surpassing, that of the most powerful supercomputers.
http://ecommercetimes.com/story/The-Evolution-of-Spam-Part-1-New-Tricks-60282.html