Site hosted by Angelfire.com: Build your free website today!

Conficker: 2009 Malware Public Enemy #1

Top 5 Global Malware Threats


Timeline of Conficker Blog of USA Today Journalist Byron Acohido



Conficker "eye chart"
or Tell at a glance if you're infected

***Conficker A, B, and C removal tool from Symantec (FixDwndp.exe)***
(link provided for those who may not be able to access Symantec directly)

Directions for use and link to download tool @ Symantec


ALERT: Conficker Attack 1 April 2009

The major Botnet Worm, Conficker, has infected over 12 million computers globally and shows no sign of stopping. It has, however, slowed a bit in recent weeks. This behavior is a Red Flag to Anti-Malware Technicians.

Dedicated researchers have determined that Conficker holds a 1 April 2009 payload date within it's programming. What this means is that something will be happening that day. The bad news is that no one knows exactly what will be happening.

Make sure your PC is patched FULLY, that includes WIN, MAC, and Linux based machines, as well as all other platforms. Even though there are no known infections of Mac systems by Conficker (Linux has been bit with detection noted March 2009) that does not make the risk impossible. Since Conficker travels across networks and via portable media (like custom burned CD's) as well as via p2p and through exploits in Adobe and Java (as well as Windows) everyone can be considered to be at risk. Better safe than sorry after all. Below find links to relevant media reports.



Also Known As (*not a complete listing*):

Crypt.AVL (AVG)
Win32/Conficker.A (CA)
Trojan.Win32.Pakes.lxf (F-Secure)
Trojan.Win32.Agent.bccs (Kaspersky)
Trojan.Win32.Pakes.lxf (Kaspersky)
Trojan-Downloader.Win32.Agent.aqfw (Kaspersky)
W32/Conficker.worm (McAfee)
Trojan:Win32/Conficker!corrupt (Microsoft)
Worm:Win32/Conficker.A (Microsoft)
Worm:Win32/Conficker.B (Microsoft)
Mal/Conficker-A (Sophos)
W32.Downadup (Symantec)
W32.Downadup.B (Symantec)
WORM_DOWNAD (Trend Micro)
WORM_DOWNAD.A (Trend Micro)
Confickr (other)
TA08-297A (other)
CVE-2008-4250 (other)
VU827267 (other)



Don't Panic or Something to keep in mind with the rest of the links

Conficker Wikipedia

Conficker Blog Lavasoft (aka AdAware) 26 Mar 2009

Conficker: Real Snopes

W32/Conficker Microsoft

Protect yourself from the Conficker computer worm Microsoft

ICANN and the Conficker Cabal New York Times 18 Mar 2009

Bits: Conficker April Fool's? NY Times 19 March 2009

W32/Conficker.worm McAfee (aka Avert Industries)

Conficker Fighting Back Tech Herald Blog (with updates)



I posted the following to Wiki as a response to "how does this thing travel?"; this pretty much sums it up (direct copy and paste):

"(via) public and private networks, email attachments, and portable media. Portable media including but not limited to: USB sticks/flash drives, custom burned cd's (and I would presume DVD's as well), and floppies. Which would imply that XBOX systems may be vulnerable, but I haven't heard anything yet about that. Someone else noted that Conficker does not have an .exe file, which is technically correct, and allows for it to travel pretty much however it wants to. Once it's on a system and has a way to get off and spread it usually does. Watch out for McDonald's, hotels, and the ever popular Universities while you're at it."



UPDATE: New Conficker Variant

Conficker's 1 Apr payload was apparently for another update. There are now 5 known primary strains with the most recent being documented 8 Apr 2009. The same advice holds true: patch your system and have a reliable (and UPDATED) anti-malware running. See Recommended Products (link below) for patch assistance. As an additional precaution against all malware, it is also recommended that you disable the auto-run feature.



Conficker Worm Reveals Its Business Model PC World 9 Apr 2009

Conficker Causes Rise in Hoax Security Software PC World 9 Apr 2009

Microsoft: Hoax security software on the rise PC Advisor 8 Apr 2009


Other Malware taking advantage of vulnerabilities used by Conficker

Neeris Microsoft (aka Worm.SDBot [Trend Micro])

Storm/Fuclip/Nuwar and Waledac/Iksmas




REWARD

Microsoft has announced a US$250,000 reward for information that results in the arrest and conviction of those responsible for illegally launching the Conficker worm.

Individuals with information about the Conficker worm are encouraged to contact their international law enforcement agencies. Additionally, Microsoft has implemented an Antivirus Reward Hotline, 1-425-706-1111, and an Antivirus Reward Mailbox, avreward@microsoft.com,where tips can be shared.


Site Links

Back to Computer Acting Wierd?