The Conficker worm – also known as Downadup – will have a big day on the first of April, when it is expected to evolve yet again. But patches exist for the weakness which Conficker uses, so how much should enterprises fear?
On Wednesday, Conficker will blast out requests to 500 of the 50,000 domains it generates daily, in search of an update. What that update will do isn’t known; what is known is that the worm has proven to be an impressive piece of malware as such things go. Version C, the latest iteration, added peer-to-peer communication between infected systems and a new domain-generation algorithm.
The worm emerged properly in 2008, when a version appeared in November, targetting a weakness in Windows Server that Microsoft had patched in October. Since then, updated versions have gone on to infect millions of machines. As well as the Windows flaw, virus has – since the Win32/Conficker.B variant – been able to spread through network shares that have weak passwords.
The C update also added a new set of armour to protect itself: it can kill some DNS (Domain Name System) lookups and disable AutoUpdate and some anti-virus software.
Fortunately, there are ways for anyone who gets infected to manually remove the latest version, and there are also removal tools available from Symantec and others to help users clean their systems.
“From a high-level perspective, the ‘A’ variant gave the impression [of being] a ‘test run,'” said Pierre-Marc Bureau, a researcher at Eset. “It had code that probably was not meant to be spread globally. For example, it was checking for the presence of a Ukrainian keyboard or Ukrainian IP before infecting a system.”
The first variants of the threat also sought to download and execute a file called loadav.exe, leading researchers to think the first goal was to install rogue anti-virus software, Bureau added. The file however was never uploaded to a Web server and thus never downloaded by Conficker.
The second version of the worm spread added the ability to get into network shares, and also scanned for targets with greater speed than the previous version, and additionally spread through removable media such as USB sticks.
Security vendors responded by updating their defences, and the mind or minds behind the worm have continued to answer in kind.
“During the last week, 3.88 percent of our users have been attacked by Conficker, either because they accessed an infected device or by a network attack,” Bureau said. “The percentage is very high and shows that a high number of computers are presently infected and that the worm is still spreading.”
With millions of PCs infected, the situation has prompted several organisations, including Microsoft and AOL, to team up to tame Conficker by disabling domains targeted by the worm. Still, researchers are no closer to guessing the end game of the mind or minds behind it.
Page: 1 2
US finalises $4.7bn award to Samsung Electronics, $1.6bn to Texas Instruments to boost domestic chip…
OpenAI begins safety testing of new model o3 that uses 'reasoning' process to ensure reliability…
US Commerce Department reportedly adding China's Sophgo to trade blacklist after TSMC-manufactured part found in…
Amazon staff in seven cities across US go on strike after company fails to negotiate,…
Two US senators ask president Joe Biden to delay TikTok ban by 90 days after…
Reporters Without Borders calls on Apple to remove AI notification summaries feature after it generates…