Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Three million hit by Windows worm ( known as Conficker, Downadup, or Kido )
BBC ^ | Friday, 16 January 2009 14:54 GMT, | BBC Staff

Posted on 01/16/2009 2:11:18 PM PST by Ernest_at_the_Beach

A worm that spreads through low security networks, memory sticks, and PCs without the latest security updates is posing a growing threat to users.

The malicious program, known as Conficker, Downadup, or Kido was first discovered in October 2008.

Although Microsoft released a patch, it has gone on to infect 3.5m machines.

Experts warn this figure could be far higher and say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch.

(Excerpt) Read more at news.bbc.co.uk ...


TOPICS: Computers/Internet
KEYWORDS: conficker; downadup; kido; lowqualitycrap; malware
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081 next last

1 posted on 01/16/2009 2:11:18 PM PST by Ernest_at_the_Beach
[ Post Reply | Private Reply | View Replies]

To: ShadowAce
This one is sophisticated....
2 posted on 01/16/2009 2:11:57 PM PST by Ernest_at_the_Beach (No Burkas for my Grandaughters!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

ping


3 posted on 01/16/2009 2:12:56 PM PST by unkus
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

http://www.f-secure.com/v-descs/worm_w32_downadup_al.shtml

f-secure estimates 8 million infections


4 posted on 01/16/2009 2:13:14 PM PST by xcamel (The urge to save humanity is always a false front for the urge to rule it. - H. L. Mencken)
[ Post Reply | Private Reply | To 1 | View Replies]

********************************EXCERPT***********************

Speaking to the BBC, Kaspersky Lab's security analyst, Eddy Willems, said that a new strain of the worm was complicating matters.

"There was a new variant released less than two weeks ago and that's the one causing most of the problems," said Mr Willems

5 posted on 01/16/2009 2:13:29 PM PST by Ernest_at_the_Beach (No Burkas for my Grandaughters!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ernest_at_the_Beach

What does it do?


6 posted on 01/16/2009 2:13:35 PM PST by citizen (Fascism: All persons, capital & activities exist to support the will & best interests of the State.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ernest_at_the_Beach

“....users should have up-to-date anti-virus software and install Microsoft’s MS08-067 patch.”

Or install Linux immediately....


7 posted on 01/16/2009 2:18:33 PM PST by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

Mandatory life in prison for makers of worms, and malware.


8 posted on 01/16/2009 2:19:25 PM PST by VanDeKoik
[ Post Reply | Private Reply | To 1 | View Replies]

To: citizen; xcamel
Not sure....it certainly takes over your system ....

Probably turns it into a system the hacker can use for other purposes....

another article:

Outbreak of the polymorphic worm Downadup aka Conficker aka Kido

Posted Jan 15, 2009

- Revision v1.00, Jan 16, 2009: The number of Downadup infections are skyrocketing based on F-Secure’s calculations. From an estimated 2.4 million infected machines to over 9 (nine) million during the last four days…

- Revision v1.01, Jan 16, 2009: Blog post updated for reason of actual occurances.

The Downadup worm that exploits a months-old Windows bug/vulnerability has infected more than a million PCs in the past 24 hours, a security company said today. Aliases of the worm are Worm.Conficker [PCTools], W32.Downadup [Symantec], Net-Worm.Win32.Kido.ih [Kaspersky Lab], W32/Conficker.worm [McAfee], W32/Confick-A [Sophos], Worm:Win32/Conficker.A [Microsoft], Worm.Win32.Conficker [Ikarus]

Early Wednesday the in Finland-based security firm F-Secure Corp. estimated that 3.5 million PCs have been compromised by the “Downadup” worm, an increase of more than 1.1 million since Tuesday.

“[And] we still consider this to be a conservative estimate,” said Sean Sullivan, a researcher at F-Secure, in an entry to the company’s Security Lab blog. Yesterday, F-Secure said the worm had infected an estimated 2.4 million machines.

The worm, which several security companies have described as surging dramatically during the past few days, exploits a bug in the Windows Server service used by all supported versions of Microsoft Corp.’s operating system, including Windows 2000, XP, Vista, Server 2003 and Server 2008.

The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.

The neat thing about Downadup is the way it “phones home”. As Mikko Hyppönen, chief research officer at anti-virus company F-Secure explains:

It uses a complicated algorithm which changes daily and is based on timestamps from public websites such as Google.com and Baidu.com. With this algorithm, the worm generates many possible domain names every day. It concern hundreds of names such as: qimkwaify .ws, mphtfrxs .net, gxjofpj .ws, imctaef .cc, and hcweu .org. This makes it impossible and/or impractical to shut them all down — most of them are never registered in the first place. The bad guys only need to predetermine one possible domain for tomorrow, register it, and set up a website — and they then gain access to all of the infected machines.

Anybody can register one of the unused domains and gain access to all of the infected machines. Pretty dumb. However, everyone will sit by and watch the infections happen, because nobody can interfere: unauthorised use of a PC may even be illegal. It’s like watching a small child wandering onto a motorway….

Downadup can also spread by using an autorun file on a USB memory stick, so if you autorun thumb drives on an unpatched machine, you could be vulnerable.

Almost all the infections are of Windows XP machines and, as Microsoft notes, plenty of corporate customers (who are usually not using AutoUpdate) have been caught. F-Secure says:

“A very large part of that traffic is coming from corporate networks, through firewalls, proxies, and NAT routers. Meaning that one unique IP address that we see could very well be 2,000 infected workstations in real life.”

Either way, security experts are anxiously awaiting the attackers’ next move. They suspect a massive botnet is in the works, but so far the attackers haven’t completely tipped their hand. The mere infection of so many machines that could then be controlled by a third party indicates it is indeed a botnet-in-progress, according to Damballa, a computer security company devoted to disrupting botnets. “It’s a close call. If it has the potential for a remote, malicious third party to do whatever they want, that makes it a botnet,” says Paul Royal, chief scientist for the antibotnet company.

“Whoever is behind this is not ready to deploy his or her code just yet. Maybe they first need to figure out how to get their botnet controller to scale to handle [millions of] nodes,” Stewart, director of malware research for SecureWorks, notes.

One thing that is certain: The worm is spreading like wildfire, and its creators appear to be trying to beat the clock and infect as many machines as they can that haven’t yet patched for the Windows bug/vulnerability. The perpetrators have been cranking out new variants of the worm to evade detection, and, so far, its main mission has been pushing rogue antivirus software.

According to Damballa, Confickr/Downadup spreads fast like a Slammer, but this one has a command and control channel: “It propagates like a worm and can act like a bot. Perhaps it’s representative of a hybrid that may represent a new class of malware” rather than the social networking or email lures of old.

Urgent advice: users are strongly recommended to ensure their antivirus databases are up to date. A patch for the windows bug/vulnerability is available from Microsoft: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx It concern Microsoft Security Bulletin MS08-067 – Critical / Vulnerability in Server Service Could Allow Remote Code Execution (958644)

Sources/references of this outbreak alert and background information:

Kaspersky Lab
Guardian.co.uk
Microsoft
ThreatExpert
F-Secure
Symantec
NetworkWorld
DarkReading

Kaspersky Lab disinfection/removal tool: http://support.kaspersky.com/faq/?qid=208279973

List of domains that are currently distributing the Downadup worm and its variants: http://www.f-secure.com/weblog/archives/downadup_domain_blocklist.txt

9 posted on 01/16/2009 2:20:12 PM PST by Ernest_at_the_Beach (No Burkas for my Grandaughters!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: citizen
What does it do?

Creates Obamessiah voters/supporters?

10 posted on 01/16/2009 2:20:12 PM PST by AFreeBird
[ Post Reply | Private Reply | To 6 | View Replies]

To: proxy_user
Or install Linux immediately....

MS operating systems are a virus on the entire IT industry.

11 posted on 01/16/2009 2:20:49 PM PST by central_va (Co. C, 15th Va., Patrick Henry Rifles-The boys of Hanover Co.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: proxy_user
Or install Linux immediately....

MS operating systems are a virus on the entire IT industry.

12 posted on 01/16/2009 2:21:00 PM PST by central_va (Co. C, 15th Va., Patrick Henry Rifles-The boys of Hanover Co.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Ernest_at_the_Beach

It spreads using a hole in RPC that has been patched months ago. All those people with infected machines have only themselves to blame. Morons.


13 posted on 01/16/2009 2:21:30 PM PST by cartan
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

Spend 10 minutes on a patch install or weeks trying to get stuff like Flash and Java to work correctly.

I’ll take the patch.


14 posted on 01/16/2009 2:21:44 PM PST by VanDeKoik
[ Post Reply | Private Reply | To 7 | View Replies]

To: proxy_user

Crap! I know Mac is no longet immune from virus’s but glad I’ve got an Apple.


15 posted on 01/16/2009 2:21:49 PM PST by LuciaMia
[ Post Reply | Private Reply | To 7 | View Replies]

To: VanDeKoik

Java works fine on *nix.

I should know, I’m a Java programmer in a Solaris environment, among my many other duties.


16 posted on 01/16/2009 2:23:19 PM PST by proxy_user
[ Post Reply | Private Reply | To 14 | View Replies]

To: proxy_user

“Or install Linux immediately....”

As soon as there are enough networked Linux machines, the creeps will write Linux viruses and worms. Sometimes “nation state” resources are behind these pests, so resources are deep.

They write for Windows and PCs because that’s what, 90% of what’s out there so if you want it to spread, you write for the most interconnects.


17 posted on 01/16/2009 2:23:39 PM PST by DBrow
[ Post Reply | Private Reply | To 7 | View Replies]

To: citizen
Your answer in this verbiage:

*************************excerpt***************************

Either way, security experts are anxiously awaiting the attackers’ next move. They suspect a massive botnet is in the works, but so far the attackers haven’t completely tipped their hand. The mere infection of so many machines that could then be controlled by a third party indicates it is indeed a botnet-in-progress, according to Damballa, a computer security company devoted to disrupting botnets. “It’s a close call. If it has the potential for a remote, malicious third party to do whatever they want, that makes it a botnet,” says Paul Royal, chief scientist for the antibotnet company.

“Whoever is behind this is not ready to deploy his or her code just yet. Maybe they first need to figure out how to get their botnet controller to scale to handle [millions of] nodes,” Stewart, director of malware research for SecureWorks, notes.

18 posted on 01/16/2009 2:24:07 PM PST by Ernest_at_the_Beach (No Burkas for my Grandaughters!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: DBrow

You can write as many viruses as you like, but if your Linux system has no listeners running, and you browse the web as yourself and not as root, they cannot harm you.

What they try is social engineering tricks, but usually Unix guys are not dumb enough to type in the root password if requested in an email or web page.


19 posted on 01/16/2009 2:26:05 PM PST by proxy_user
[ Post Reply | Private Reply | To 17 | View Replies]

To: DBrow
Not so easy....and the are plans to improve Linus security even further,.....FR Thread:

LCA 2009: Making Linux more secure

20 posted on 01/16/2009 2:27:16 PM PST by Ernest_at_the_Beach (No Burkas for my Grandaughters!)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson