Storm masks its command and control structure in eDonkey
Uses P2P traffic, not IRC
Turns infected machines into bots
Uses low DNS time to live (TTL) cycles