Feeds

Conficker botnet stirs to distribute update payload

It's alive!

5 things you didn’t know about cloud backup

The Conficker superworm is stirring, with the spread of a new variant that spreads across P2P and drops a payload. It is thought to update machines infected by earlier strains of the worm.

Conficker-E (the latest variant) offers potential clues on the origins of the worm, because of possible links to other malware. Trend Micro reports that the new Downadup/Conficker variant is talking to servers associated with the Waledac family of malware, in order to download further unwanted items.

Waledec, in turn, is suspected as the latest item of malware from the gang behind the Storm botnet, sparking speculation that all three strains of botnet client are the work of the same cybercriminal gang.

A preliminary analysis by Symantec suggests that PCs infected by earlier variants are getting updates.

On April 8, 2009 we discovered a new sample that is a slightly modified version of the original W32.Downadup worm. The worm previously updated its functionality with the .C variant which installed on top of the .B variant infections, and we are now seeing the same type of update happening on top of the .A variant infections.

This new sample reintroduces the MS08-067 exploit vector, which was removed in the .C variant. It includes previously unseen self-removal functionality to remove itself from the infected host on May 3, 2009. The new sample includes a slightly different list of URLs used to obtain the IP address of the infected host and also reaches out to a new list of high-profile domains to confirm the current date. When reaching out to these domains the threat is not exploiting any weakness nor downloading any code.

We have also observed a possible connection to W32.Waledac, one of the most active spam bots, and have some circumstantial evidence that the two may be linked with W32.Downadup.C distributing W32.Waledac. W32.Waledac steals sensitive information, turns computers into spam zombies, and establishes a back door remote access. Symantec products provide antivirus and IPS protection for Waledac.

This new sample does not appear to include any new infection vectors that might allow the threat to spread faster or onto new machines.

The latest variant of Conficker uses randomly generated ports between the ranges of 1024 and 10000 to communicate and propagate. Analysis of the malware, detected on Wednesday night, remains ongoing.

The malware components downloaded by the new version of Conficker may not themselves be anything new. Patrik Runald, chief security advisor at F-Secure, reports that his firm (at least) has detected these components since 30 December.

At the time of writing there's no evidence that access to the Conficker botnet is being used to send spam, launch denial of service attacks or any other nefarious activity normally associated with compromised PCs. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.