Joe Stewart, GCIH
The New York Times article Attack of the Zombie Computers Is Growing Threat said
Moreover, although rustock is currently being used for distributing spam, it is a more general tool that can be used with many other forms of illegal Internet activity.
“It could be used for other types of malware as well,” said Joe Stewart, a researcher at SecureWorks, an Atlanta-based computer security firm. “It’s just a payload delivery system with extra stealth.”
Last month Mr. Stewart tracked trading around a penny stock being touted in a spam campaign. The Diamant Art Corporation was trading for 8 cents on Dec. 15 when a series of small transactions involving 11,532,726 shares raised the price of the stock to 11 cents. After the close of business that day, a Friday, a botnet began spewing out millions of spam messages, he said.
On the following Monday, the stock went first to 19 cents per share and then ultimately to 25 cents a share. He estimated that if the spammer then sold the shares purchased at the peak on Monday he would realize a $20,000 profit. (By Dec. 20, it was down to 12 cents.)
Joe Stewart, GCIH is Senior Security Researcher with
SecureWorks who
specializes in reverse-engineering malware
and is also a
GIAC Certified Incident Handler.
He authored the following software available for free download:
Fess (File Exploit Scanning System),
Mumsie (Malicious URL Monitor and Snort Injection Engine),
Truman (Behavioral analysis sandnet),
Foregone (Forensic file recovery tool), plus a collection of
Reverse Engineering Tools.
He is also a frequent commentator on security issues for leading media
organizations such as The New York Times, MSNBC, Washington Post, USA
Today and others.
A popular speaker, Joe has presented at DEFCON 14, Las Vegas, NV;
Raleigh ISSA, Raleigh, NC; Infosecurity Canada, Toronto; RECON
2006, Montreal, Quebec; CSI NetSec, Phoenix, AZ; SANS Denver, Denver,
CO; InfoSec World Conference 2006, Orlando, FL; Silicon Valley ISSA,
San Jose, CA; CodeCon 2006, San Francisco, CA; ShmooCon 2006,
Washington D.C., among many events.
Joe authored
Manually Unpacking a Morphine-Packed DLL with OllyDbg,
SpamThru Trojan Analysis,
DNS Cache Poisoning: The Next Generation,
Pay-per-Click Hijacking,
BitTorrent and the Legitimate Use of P2P,
AdSubtract Proxy ACL Bypass Vulnerability,
Windows Messenger Popup Spam on UDP Port 1026,
Alien Autopsy: Reverse Engineering Win32
Trojans on Linux,
Sobig.e – Evolution of the Worm,
Reverse-Proxy Spam Trojan — Migmaf,
Webdav Exploits Exposed,
Sobig.a and the Spam You Received Today,
Reverse Engineering Hostile Code,
Exposing the Underground: Adventures of an Open Proxy
Server, and
Wormsign: Predicting the Next Outbreak.
Read his
full list of publications!
He also coauthored
Detecting and Containing IRC-Controlled Trojans: When
Firewalls, AV, and IDS Are Not Enough,
Milkit: An Innovator of Old Technology, and
Managed Security Services and the Incident Handling
Process.
OllyDbg Plugins and Scripts by Joe include Analyze
This! (Force analysis of non-code sections),
AttachAnyway
(Anti-anti-attach PoC),
Labelmaster
(Batch processing of labels/comments,
OllyBonE (unpacking
plugin for OllyDbg),
OllyGraph
(code flowchart plugin),
OllyPerl (Perl
scripting for OllyDbg),
OllyVBHelper
(aids in reverse-engineering Visual Basic apps), and WaveDiff (binary
difference analysis for OllyDbg (uses OllyPerl).
Read his blog posts on the
SecureWorks Blog and OpenRCE Blog.
Read his LinkedIn profile.