You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Science & Technology
Conficker virus begins to attack PCs
2009-04-25
BOSTON (Reuters) - A malicious software program known as Conficker that many feared would wreak havoc on April 1 is slowly being activated, weeks after being dismissed as a false alarm, security experts said.

Conficker, also known as Downadup or Kido, is quietly turning thousands of personal computers into servers of e-mail spam and installing spyware, they said.

The worm started spreading late last year, infecting millions of computers and turning them into "slaves" that respond to commands sent from a remote server that effectively controls an army of computers known as a botnet.

Its unidentified creators started using those machines for criminal purposes in recent weeks by loading more malicious software onto a small percentage of computers under their control, said Vincent Weafer, a vice president with Symantec Security Response, the research arm of the world's largest security software maker, Symantec Corp.

"Expect this to be long-term, slowly changing," he said of the worm. "It's not going to be fast, aggressive."

Conficker installs a second virus, known as Waledac, that sends out e-mail spam without knowledge of the PC's owner, along with a fake anti-spyware program, Weafer said.

The Waledac virus recruits the PCs into a second botnet that has existed for several years and specializes in distributing e-mail spam.

"This is probably one of the most sophisticated botnets on the planet. The guys behind this are very professional. They absolutely know what they are doing," said Paul Ferguson, a senior researcher with Trend Micro Inc, the world's third-largest security software maker.

He said Conficker's authors likely installed a spam engine and another malicious software program on tens of thousands of computers since April 7.

He said the worm will stop distributing the software on infected PCs on May 3 but more attacks will likely follow.

"We expect to see a different component or a whole new twist to the way this botnet does business," said Ferguson, a member of The Conficker Working Group, an international alliance of companies fighting the worm.

Researchers had feared the network controlled by the Conficker worm might be deployed on April 1 since the worm surfaced last year because it was programed to increase communication attempts from that date.

The security industry formed the task force to fight the worm, bringing widespread attention that experts said probably scared off the criminals who command the slave computers.

The task force initially thwarted the worm using the Internet's traffic control system to block access to servers that control the slave computers.

Viruses that turn PCs into slaves exploit weaknesses in Microsoft's Windows operating system. The Conficker worm is especially tricky because it can evade corporate firewalls by passing from an infected machine onto a USB memory stick, then onto another PC. Continued...

Posted by:GolfBravoUSMC

#8  Dale -- just click on the link below. (If it doesn't work, just copy and paste it into your browser)..

Posted by: Zorba Craising6734   2009-04-25 21:33  

#7  Where do I go to install that fine looking conficker tool. I think it looks easy to ficker out.
TKY
Dale
Posted by: Dale   2009-04-25 20:59  

#6  Here's a test to see if you're infected. Both my laptop and desktop are fine. So far.

http://www.confickerworkinggroup.org/infection_test/cfeyechart.html
Posted by: Zorba Craising6734   2009-04-25 18:58  

#5   it can evade corporate firewalls by passing from an infected machine onto a USB memory stick, then onto another PC.

The wonders of autorun.inf

Posted by: john frum   2009-04-25 17:49  

#4  Thye also need to end the "genuine advantage" scheme for security patches.

There is no genuine advantage requirement for security patches. That applies only to optional software downloads. The problem is that most people don't enable automatic security patch downloads and installations.
Posted by: Zhang Fei   2009-04-25 13:24  

#3  Thye also need to end the "genuine advantage" scheme for security patches.

There's a lot of unlicensed computers (not mine) that don't have patches and the more there are infected, the worse for everyone else.
Posted by: Bright Pebbles   2009-04-25 10:38  

#2  Microsoft needs to concentrate on making an operating system that isn't full of holes.
Posted by: gromky   2009-04-25 10:26  

#1  They really need to find the owners of these botnets and put them away one way or another.
Posted by: 3dc   2009-04-25 10:12  

00:00