April Foolโs?
Not by a long shot.
While there was no denial-of-service attack, no identify theft on a massive scale, no raging spambot action on the day the most-hyped worm in recent memory was supposed to go into action, it has activated and itโs going to continue to plague infected computers, according to the chief security advisor at F-Secure Corp.
Conficker, which has infected an estimated 10 million computers worldwide, was designed to automatically look for updates from hosts around the Web. โMillions of computers are doing just that as we speak, but thereโs nothing to download,โ said Patrick Runald.
There could be a couple of reasons for that, Runald said. Maybe the wormโs designers didnโt make a download available, given the amount of press the countdown to Confickerโs April 1 D-Day attracted. โUnfortunately, theyโre not stupid,โ Runald said.
And efforts by domain registries around the world, including the Canadian Internet Registration Authority, which controls .ca domains, to block URLs the worm seeks out were effective, Runald said.
โIs it because we did such a great job raising awareness and getting people to patch and update? Possibly. Is it because the worm didnโt do anything? Possibly,โ said David Marcus, director of security research and communications with McAfee Inc.โs Avert Labs.
โWeโve been around the clock (monitoring) Conficker for the last couple of days โฆ there hasnโt been a lot of activity,โ Marcus said.
Conficker first appeared on the scene in September 2008. While the A and B variants of the worm were designed to infect as many machines as possible, the C variant has a different agenda, said Stefan Chenette, manager of security research with Websense Inc.
The C variant had only about 15 per cent of the code of previous iterations, and was designed specifically to protect itself with anti-security measures, he said.
READ MORE:IT World Canadaโs Conficker Resource Centre
Given that methodology, researchers anticipate that โthe next variant is going to do something massively destructive,โ Chenette said. That could be a single massive attack, or perhaps the authors of the worm will rent the botnet out to others for smaller spam or denial-of-service attacks.
Dormant since January, on April 1 the worm began generating a list of 50,000 domain names a day. From that list, it chooses 500 at random and checks to see if an update is available.
โFrom now on, itโs going to do that every single day,โ said Runald. โIf youโre infected, you have to worry about it every day.
โItโs a loaded gun. Letโs unload it.โ
And just because the worm isnโt updating through the random domain process, that doesnโt mean it canโt update. Runald said Conficker can also update through a peer-to-peer process with other infected machines, a vector that hasnโt received much attention.
โThey could do that at any time. But they didnโt,โ Runald said.
While registries worldwide prevented the registration of the domain names generated by Variant C of the worm, the designers could have registered a domain name before the worm was discovered and dissected, Runald said.
The good news is the worm isnโt difficult to detect. If you canโt access Microsoft Corp.โs Web site, nor the Web sites of security companies like F-Secure, McAfee or Symantec Corp., thereโs a good chance your computer is infected, Marcus said.
Once detected, users can run a tool like McAfeeโs Stinger to remove the malware.
According to Runald, the Web site for the Conficker Working Group has links to several free removal tools. But be wary of simply doing a Web search for Conficker removal utilities, he said; many of those on offer actually contain malware.
And make sure to update Windows after cleansing, since one of the effects of the worm is to keep computers from accessing updates to the operating system, he said.
The Conficker Working Group is a coalition of technology companies, public groups and law enforcement led by Microsoft โ which has placed a US$250,000 bounty on the creators of the worm โ brought together to battle the worm. With malware exploit following malware exploit for the foreseeable future, should the industry make such ad hoc arrangements permanent?
โThereโs certainly something to that,โ Marcus said. โWeโre certainly better together than we are separately.โ Involving tech companies, law enforcement and third parties in the process means โyou get lots of brilliant minds working together.โ
โMalware wonโt go away. Itโs about money. Just like car theft wonโt go away, just like bank robberies wonโt go away โฆ thereโs money on the other side of that vault.โ