SUBSCRIBE

Conficker: Was that it?

April Foolโ€™s?

Not by a long shot.

While there was no denial-of-service attack, no identify theft on a massive scale, no raging spambot action on the day the most-hyped worm in recent memory was supposed to go into action, it has activated and itโ€™s going to continue to plague infected computers, according to the chief security advisor at F-Secure Corp.

Conficker, which has infected an estimated 10 million computers worldwide, was designed to automatically look for updates from hosts around the Web. โ€œMillions of computers are doing just that as we speak, but thereโ€™s nothing to download,โ€ said Patrick Runald.

There could be a couple of reasons for that, Runald said. Maybe the wormโ€™s designers didnโ€™t make a download available, given the amount of press the countdown to Confickerโ€™s April 1 D-Day attracted. โ€œUnfortunately, theyโ€™re not stupid,โ€ Runald said.

And efforts by domain registries around the world, including the Canadian Internet Registration Authority, which controls .ca domains, to block URLs the worm seeks out were effective, Runald said.

โ€œIs it because we did such a great job raising awareness and getting people to patch and update? Possibly. Is it because the worm didnโ€™t do anything? Possibly,โ€ said David Marcus, director of security research and communications with McAfee Inc.โ€™s Avert Labs.

โ€œWeโ€™ve been around the clock (monitoring) Conficker for the last couple of days โ€ฆ there hasnโ€™t been a lot of activity,โ€ Marcus said.

Conficker first appeared on the scene in September 2008. While the A and B variants of the worm were designed to infect as many machines as possible, the C variant has a different agenda, said Stefan Chenette, manager of security research with Websense Inc.

The C variant had only about 15 per cent of the code of previous iterations, and was designed specifically to protect itself with anti-security measures, he said.

READ MORE:IT World Canadaโ€™s Conficker Resource Centre

Given that methodology, researchers anticipate that โ€œthe next variant is going to do something massively destructive,โ€ Chenette said. That could be a single massive attack, or perhaps the authors of the worm will rent the botnet out to others for smaller spam or denial-of-service attacks.

Dormant since January, on April 1 the worm began generating a list of 50,000 domain names a day. From that list, it chooses 500 at random and checks to see if an update is available.

โ€œFrom now on, itโ€™s going to do that every single day,โ€ said Runald. โ€œIf youโ€™re infected, you have to worry about it every day.

โ€œItโ€™s a loaded gun. Letโ€™s unload it.โ€

And just because the worm isnโ€™t updating through the random domain process, that doesnโ€™t mean it canโ€™t update. Runald said Conficker can also update through a peer-to-peer process with other infected machines, a vector that hasnโ€™t received much attention.

โ€œThey could do that at any time. But they didnโ€™t,โ€ Runald said.

While registries worldwide prevented the registration of the domain names generated by Variant C of the worm, the designers could have registered a domain name before the worm was discovered and dissected, Runald said.

The good news is the worm isnโ€™t difficult to detect. If you canโ€™t access Microsoft Corp.โ€™s Web site, nor the Web sites of security companies like F-Secure, McAfee or Symantec Corp., thereโ€™s a good chance your computer is infected, Marcus said.

Once detected, users can run a tool like McAfeeโ€™s Stinger to remove the malware.

According to Runald, the Web site for the Conficker Working Group has links to several free removal tools. But be wary of simply doing a Web search for Conficker removal utilities, he said; many of those on offer actually contain malware.

And make sure to update Windows after cleansing, since one of the effects of the worm is to keep computers from accessing updates to the operating system, he said.

The Conficker Working Group is a coalition of technology companies, public groups and law enforcement led by Microsoft โ€“ which has placed a US$250,000 bounty on the creators of the worm โ€“ brought together to battle the worm. With malware exploit following malware exploit for the foreseeable future, should the industry make such ad hoc arrangements permanent?

โ€œThereโ€™s certainly something to that,โ€ Marcus said. โ€œWeโ€™re certainly better together than we are separately.โ€ Involving tech companies, law enforcement and third parties in the process means โ€œyou get lots of brilliant minds working together.โ€

โ€œMalware wonโ€™t go away. Itโ€™s about money. Just like car theft wonโ€™t go away, just like bank robberies wonโ€™t go away โ€ฆ thereโ€™s money on the other side of that vault.โ€

Tech Jobs

Categories