Internet worm set to change tactics April 1

Search
Joined
Jan 17, 2007
Messages
99,709
Tokens
Internet worm set to change tactics April 1

Outbreak shows importance of keeping current with security updates


SAN FRANCISCO - The fast-moving Conficker computer worm, a scourge of the Internet that has infected at least 3 million PCs, is set to spring to life in a new way on Wednesday — April Fools' Day.
That's when many of the poisoned machines will get more aggressive about "phoning home" to the worm's creators over the Internet. When that happens, the bad guys behind the worm will be able to trigger the program to send spam, spread more infections, clog networks with traffic, or try and bring down Web sites.
Technically, this could cause havoc, from massive network outages to the creation of a cyberweapon of mass destruction that attacks government computers. But researchers who have been tracking Conficker say the date will probably come and go quietly.

More likely, these researchers say, the programming change that goes into effect April 1 is partly symbolic — an April Fools' Day tweaking of Conficker's pursuers, who for now have been able to prevent the worm from doing significant damage.
"I don't think there will be a cataclysmic network event," said Richard Wang, manager of the U.S. research division of security firm Sophos PLC. "It doesn't make sense for the guys behind Conficker to cause a major network problem, because if they're breaking parts of the Internet they can't make any money."
Just to be safe, Johannes B. Ullrich, chief research officer for the SANS Institute, a security research organization, said home computer users “should make sure they regularly patch their systems,” and specifically “enable automatic downloads of Microsoft’s monthly patches.”
The organization keeps a list of “vetted cleanup tools” at http://isc.sans.org/conficker.
Ullrich also said PC users should turn on the firewall function in Microsoft Windows, although it “should be enabled automatically with Windows XP SP2 or later” editions of Windows. (Msnbc.com is a joint venture of Microsoft and NBC Universal.)
He also cautioned users to “not download and install any files or video viewers that are advertised via e-mail. A lot of malware is installed willingly by users because the malware claims to be some kind of new video viewer.”
“Keep good backups of critical files,” he added. “If you are infected, the best solution is to rebuild the system from scratch. This can be a lot harder if you do not have good backups.”
Previous Internet threats were designed to cause haphazard destruction. In 2003 a worm known as Slammer saturated the Internet's data pipelines with so much traffic it crippled corporate and government systems, including ATM networks and 911 centers.
Far more often now, Internet threats are designed to ring up profits. Control of infected PCs is valuable on the black market, since the machines can be rented out, from one group of bad guys to another, and act as a kind of illicit supercomputer, sending spam, scanning Web sites for security holes, or participating in network attacks.
The army of Conficker-infected machines, known as a "botnet," could be one of the greatest cybercrime tools ever assembled. Conficker's authors just need to figure out a way to reliably communicate with it.
Infected PCs need commands to come alive. They get those commands by connecting to Web sites controlled by the bad guys. Even legitimate sites can be co-opted for this purpose, if hackers break in and use the sites' servers to send out malicious commands.
So far, Conficker-infected machines have been trying to connect each day to 250 Internet domains — the spots on the Internet where Web sites are parked. The bad guys need to get just one of those sites under their control to send their commands to the botnet. (The name Conficker comes from rearranging letters in the name of one of the original sites the worm was connecting to.)
Conficker has been a victim of its success, however, because its rapid spread across the Internet drew the notice of computer security companies. They have been able to work with domain name registrars, which administer Web site addresses, to block the botnet from dialing in.
 
Joined
Jan 17, 2007
Messages
99,709
Tokens
Now those efforts will get much harder. On April 1, many Conficker-infected machines will generate a list of 50,000 new domains a day that they could try. Of that group, the botnet will randomly select 500 for the machines to actually query.
The bad guys still need to get only one of those up and running to connect to their botnet. And the bigger list of possibilities increases the odds they'll slip something by the security community.

Researchers already know which domains the infected machines will check, but pre-emptively registering them all, or persuading the registrars to neutralize all of them, is a bigger hurdle.
"We expect something will happen, but we don't quite know what it will look like," said Jose Nazario, manager of security research for Arbor Networks, a member of the "Conficker Cabal," an alliance trying to hunt down the worm's authors.
"With every move that they make, there's the potential to identify who they are, where they're located and what we can do about them," he added. "The real challenge right now is doing all that work around the world. That's not a technical challenge, but it is a logistical challenge."

Conficker's authors also have updated the worm so infected machines have new ways to talk to each other. They can share malicious commands rather than having to contact a hacked Web site for instructions.
That variation is important because it shows that even as security researchers have neutralized much of what the botnet might do, the worm's authors "didn't lose control of their botnet," said Michael La Pilla, manager of the malicious code operations team at VeriSign Inc.'s iDefense division.
The Conficker outbreak illustrates the importance of keeping current with Internet security updates. Conficker moves from PC to PC by exploiting a vulnerability in Windows that Microsoft Corp. fixed in October. But many people haven't applied the patch or are running pirated copies of Windows that don't get the updates.
Unlike other Internet threats that trick people into downloading a malicious program, Conficker is so good at spreading because it finds vulnerable PCs on its own and doesn't need human involvement to infect a machine.
Once inside, it does nasty things. The worm tries to crack administrators' passwords, disables security software, blocks access to antivirus vendors' Web sites to prevent updating, and opens the machines to further infections by Conficker's authors.
Someone whose machine is infected might have to reinstall the operating system.
 

Pro Handi-Craper My Picks are the shit
Joined
Sep 21, 2004
Messages
4,098
Tokens
Question for geek guys I mean techies. What if we change the date on the computers two days back tonight. Would we be safe and be able to see what if anything happens on April 1st??
 

Pop-culture, entertainment, sports and contest Mod
Joined
Dec 20, 2002
Messages
33,977
Tokens
NHOJ, i think i read somewhere that it wouldnt matter.....it goes by something else besides the date on "your" computer...
 

Don't assume people in charge know what they are d
Joined
Aug 16, 2006
Messages
6,476
Tokens
How about staying offline until we hear if it is overblown or real?
 

*V Andrea Rincon *V
Joined
Feb 24, 2006
Messages
1,188
Tokens
Wow, I just saw on the news if you can't access the sites- Microsoft, Symantec, and Macafee. Or be able to power down your PC then chances are high you have the worm.

This happened to me last week and I had to restore my computer to get the thing to work again. Every time I tried to open Norton to run the scan it turned itself off..

(BTW I didn't read the articles posted so it might have given those warning signs already)
 

New member
Joined
May 20, 2007
Messages
6,559
Tokens
This isn't as big a deal for individuals as it is for large businesses, here is an article with ideas for detection & how to remove the worm:

SAN FRANCISCO—The Conficker worm, a nasty computer infection that has poisoned millions of PCs, will start ramping up its efforts Wednesday to use those machines for cybercrimes. It's unclear whether everyday PC users will even notice, but this is as good an excuse as any to make sure your computer is clean.

There are some easy ways to figure out whether a computer has the Conficker worm, and free tools available for getting rid of it.

One scary thing about Conficker is that it spreads without human involvement, moving from PC to PC by exploiting a security hole in Microsoft Corp.'s Windows operating system. The hole was fixed in October, but if your computer doesn't get automatic updates from Microsoft, you could be vulnerable.

Lots of computer worms disable antivirus software outright, which can be a tip-off that something is wrong. But Conficker doesn't do that. Instead, Conficker blocks infected PCs from accessing the antivirus vendors' and Microsoft's Web sites, so victims won't get automatic updates and can't download the Conficker removal tools that those companies have developed.

So see what Web sites you can visit. If you can navigate the Internet freely except for sites owned by Microsoft or antivirus vendors such as Symantec Corp., McAfee Inc. or F-Secure Corp., your PC might have Conficker or a similar bug.

Fixing the problem gets a little trickier.

The best remedy is to have a friend -- whose computer is not infected -- download a removal tool from Microsoft or one of the antivirus vendors. Then that person should e-mail the tool to you.

A list of the free Conficker removal programs is available on the Web site of the Conficker Working Group, an alliance of companies fighting the worm. The removal programs will take care of themselves, for the most part, scanning your system and purging the worm.

One thing to note: Conficker blocks infected machines from running removal tools with "Conficker" in the name. So users might have to change the name of the file (one you've saved the tool to your desktop, right-click on it and select "rename") before running it. The program's instructions will let you know if you need to do this. Many antivirus vendors have already changed the names in their removal tools -- in some cases calling the file a misspelled variant of "Conficker" -- to trick the worm into letting the program run.

Businesses have a bigger challenge, because Conficker has yet another method for evading detection. Once the worm is inside a machine, it applies its own version of the Microsoft patch that fixes the vulnerability Conficker exploited in the first place. So a business running a standard network scan, looking for unpatched machines, might come up empty-handed, even though some computers on the network are infected.

The scans need to take a deeper dive into the machines on the network -- something an antivirus vendor's service should enable. For government agencies, contractors and operators of critical infrastructure, the Department of Homeland Security also has released a network-detection tool for Conficker.
 

Don't assume people in charge know what they are d
Joined
Aug 16, 2006
Messages
6,476
Tokens
I AM alive........for now!
2323Hrs PDT
 

Pro Handi-Craper My Picks are the shit
Joined
Sep 21, 2004
Messages
4,098
Tokens
I did get a trace of the 360 virus today on this machine but noting else as of yet. That 360 thing is bad news.
 
Joined
Jan 17, 2007
Messages
99,709
Tokens
<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/HqogvH-x4k4&hl=en&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/HqogvH-x4k4&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object>
 

L5Y, USC is 4-0 vs SEC, outscoring them 167-48!!!
Joined
Sep 20, 2004
Messages
7,025
Tokens
How about staying offline until we hear if it is overblown or real?

No because the websites WITH the virus will still look for avail computers long after April 1st. Consider the virus like "water" if that makes any sense. The key seems to be to keep your computer updated with the latest Window's patches and keep your security software updated.
 

New member
Joined
Jun 25, 2005
Messages
7,018
Tokens
So glad I bought a mac about two years ago.

Went through two pc's with in a few years as was easier to buy a new one rather than keep feeding money into the old one.

Knock on wood but don't see buying a new computer any time soon.
 

Pop-culture, entertainment, sports and contest Mod
Joined
Dec 20, 2002
Messages
33,977
Tokens
I did get a trace of the 360 virus today on this machine but noting else as of yet. That 360 thing is bad news.


thats the one i got about a month ago....had to get mine completely wiped and reinstalled....it was a bitch:ohno:
 

New member
Joined
Oct 20, 2002
Messages
11,881
Tokens
No because the websites WITH the virus will still look for avail computers long after April 1st. Consider the virus like "water" if that makes any sense. The key seems to be to keep your computer updated with the latest Window's patches and keep your security software updated.

3peet

When i used to update my computer , from windows, it used to crash my computer.

I have not had an update on my computer in over 2years.

I know it time to get a new one

Y2K
 

Forum statistics

Threads
1,108,276
Messages
13,450,156
Members
99,404
Latest member
byen17188
The RX is the sports betting industry's leading information portal for bonuses, picks, and sportsbook reviews. Find the best deals offered by a sportsbook in your state and browse our free picks section.FacebookTwitterInstagramContact Usforum@therx.com