• Welcome to The Truck Stop! We see you haven't REGISTERED yet.

    Your truck knowledge is missing!
    • Registration is FREE , all we need is your birthday and email. (We don't share ANY data with ANYONE)
    • We have tons of knowledge here for your diesel truck!
    • Post your own topics and reply to existing threads to help others out!
    • NO ADS! The site is fully functional and ad free!
    CLICK HERE TO REGISTER!

    Problems registering? Click here to contact us!

    Already registered, but need a PASSWORD RESET? CLICK HERE TO RESET YOUR PASSWORD!

Giant Internet worm set to change tactics April 1

cbrew2001

Duramadness
Messages
863
Reaction score
0
Location
Ragley, Louisiana
This is just something to lookout for and be aware of.

[FONT=Verdana,Sans-serif]Giant Internet worm set to change tactics April 1[/FONT]

Mar 27, 4:52 PM (ET)

By JORDAN ROBERTSON

SAN FRANCISCO (AP) -

The fast moving Conficker computer worm, a scourge of the Internet that has infected at least 3 million PCs, is set to spring to life in a new way on Wednesday - April Fools' Day.

That's when many of the poisoned machines will get more aggressive about "phoning home" to the worm's creators over the Internet. When that happens, the bad guys behind the worm will be able to trigger the program to send spam, spread more infections, clog networks with traffic, or try and bring down Web sites.

Technically, this could cause havoc, from massive network outages to the creation of a cyberweapon of mass destruction that attacks government computers. But researchers who have been tracking Conficker say the date will probably come and go quietly.

More likely, these researchers say, the programming change that goes into effect April 1 is partly symbolic - an April Fools' Day tweaking of Conficker's pursuers, who for now have been able to prevent the worm from doing significant damage.

"I don't think there will be a cataclysmic network event," said Richard Wang, manager of the U.S. research division of security firm Sophos PLC. "It doesn't make sense for the guys behind Conficker to cause a major network problem, because if they're breaking parts of the Internet they can't make any money."

Previous Internet threats were designed to cause haphazard destruction. In 2003 a worm known as Slammer saturated the Internet's data pipelines with so much traffic it crippled corporate and government systems, including ATM networks and 911 centers.

Far more often now, Internet threats are designed to ring up profits. Control of infected PCs is valuable on the black market, since the machines can be rented out, from one group of bad guys to another, and act as a kind of illicit supercomputer, sending spam, scanning Web sites for security holes, or participating in network attacks.

The army of Conficker-infected machines, known as a "botnet," could be one of the greatest cybercrime tools ever assembled. Conficker's authors just need to figure out a way to reliably communicate with it.

Infected PCs need commands to come alive. They get those commands by connecting to Web sites controlled by the bad guys. Even legitimate sites can be co-opted for this purpose, if hackers break in and use the sites' servers to send out malicious commands.

So far, Conficker-infected machines have been trying to connect each day to 250 Internet domains - the spots on the Internet where Web sites are parked. The bad guys need to get just one of those sites under their control to send their commands to the botnet. (The name Conficker comes from rearranging letters in the name of one of the original sites the worm was connecting to.)

Conficker has been a victim of its success, however, because its rapid spread across the Internet drew the notice of computer security companies. They have been able to work with domain name registrars, which administer Web site addresses, to block the botnet from dialing in.

Now those efforts will get much harder. On April 1, many Conficker-infected machines will generate a list of 50,000 new domains a day that they could try. Of that group, the botnet will randomly select 500 for the machines to actually query.

The bad guys still need to get only one of those up and running to connect to their botnet. And the bigger list of possibilities increases the odds they'll slip something by the security community.

Researchers already know which domains the infected machines will check, but pre-emptively registering them all, or persuading the registrars to neutralize all of them, is a bigger hurdle.

"We expect something will happen, but we don't quite know what it will look like," said Jose Nazario, manager of security research for Arbor Networks, a member of the "Conficker Cabal," an alliance trying to hunt down the worm's authors.

"With every move that they make, there's the potential to identify who they are, where they're located and what we can do about them," he added. "The real challenge right now is doing all that work around the world. That's not a technical challenge, but it is a logistical challenge."

Conficker's authors also have updated the worm so infected machines have new ways to talk to each other. They can share malicious commands rather than having to contact a hacked Web site for instructions.

That variation is important because it shows that even as security researchers have neutralized much of what the botnet might do, the worm's authors "didn't lose control of their botnet," said Michael La Pilla, manager of the malicious code operations team at VeriSign Inc.'s iDefense division.

The Conficker outbreak illustrates the importance of keeping current with Internet security updates. Conficker moves from PC to PC by exploiting a vulnerability in Windows that Microsoft Corp. (MSFT) fixed in October. But many people haven't applied the patch or are running pirated copies of Windows that don't get the updates.

Unlike other Internet threats that trick people into downloading a malicious program, Conficker is so good at spreading because it finds vulnerable PCs on its own and doesn't need human involvement to infect a machine.

Once inside, it does nasty things. The worm tries to crack administrators' passwords, disables security software, blocks access to antivirus vendors' Web sites to prevent updating, and opens the machines to further infections by Conficker's authors. Someone whose machine is infected might have to reinstall the operating system.



http://apnews.myway.com//article/20090327/D976JP4G1.html
 
Hello all. anyone who wants to be sure can download windows xpKB958644x86ENU security update this is supposed to be the patch that closes the holes confiker needs. also try windows malicious software removal tool KB890830-v2.8 it is self extracting and easy to use, I believe this tool knows what the conficker looks like. both can be found @ microsoft web site or just use your search engine to find them. and remember it's not just internet connected computers at risk, if you use USB flash drives from one machine to another that could spread this worm also. regards h
 
Redneckbuckey your norton a-v update should do fine because this worm has got so much attention all the a-v software companies are on top of this (the best they can) and if your computer is set to download windows updates automaticlly, you've already have the microsoft patch installed. the above info is for folks who don't auto update or who would like to download once (say to a usb flash drive) and take it from machine to machine updating manually. don't forget to scan for rootkits. anyway this could be a huge event or a big nothing still it's good to be ready. back up anything you don't want to lose in case the worst happens and you must boot-n-nuke and reinstall your os regards h
 
Now there is a guide that ZDNet put out:

The "no bull" guide to Conficker

Partial quote:

"It seems that more than half of all Conficker infections are confined to PCs in China, Brazil, Russia, India, and Argentina, so folks in the US and Europe have dodged the bullet … mostly. Given the relatively low number of Conficker infections that I’ve come across, I’d say that the research is spot on."
 
wow...you sir are the first I've heard of.

Did you follow the help links provided in this thread? There are fixes all over now.
 
ive had something for the last 5-8 weeks putting glechs in my laptop and everything came to a head on friday,when i couldn't run spybot or get to ms updates
 
I sometimes have had success using a different browser to gain access. You may have picked up a browser hijacker. If so, the way around that is to put some cleaners on a usb stick you can boot to. You may have a challenge on your hands.
 
browser hijack

that is the classic problem this worm presents, once its in you can't go to some sites for updates ect. I think I would try a stand alone scanner if you have one or can borrow one. or hopefully a different browser as posted above. sometimes you can't scan these things away because of the way they hide in your computer (fake .dll s ). one program that is overlooked is windows defender, now it won't get rid of this worm, but using the process explorer you may find it by the date installed the unsigned software,I have rid computers thi way after many scans failed to get it. please let us know if you get it out. and how so we can learn from you. good luck H
 
A new variant has now appeared:

Conficker evolves with new variant - InternetNews:The Blog - Sean Michael Kerner

Quote:
"... like its predecessor so far as I can tell from the current research, it's still exploiting the same Windows flaw which was patched by Microsoft back in October (so just patch your Windows boxes people!).

The real threat here though in my view is that the Conficker author(s) are continuing to evolve the worm to evade detection with the random factor that this new variant includes. In that respect, Conficker is showing itself to be a resilient threat that isn't likely to fade away from the security landscape anytime soon."
 
No worries Justin...as long as you've gotten those patches you should be fine.
People that have windows update automatically have more than likely been fixed a while back. And those that update manually have gotten the fixes too.

There are a number of tools listed in this thread to check your system and repair if needed.
 
Back
Top