Prolific worm infects 3.5m Windows PCs

echrada

Vista Guru
A prolific new worm has spread to infect more than 3.5m Windows PCs, according to net security firm F-secure. The success of the Conficker (AKA Downadup) worm is explained by its use of multiple attack vectors and new social engineering ruses, designed to hoodwink the unwary into getting infected.
The worm uses a complex algorithm to develop a changing daily list of domains which infected machines attempt to establish contact with. Hackers need only register one of these possible names to establish contact with the botnet established by Conficker. The tactic is designed to frustrate attempts by security watchers to dismantle the command and control network associated with compromised machines.
But the approach also made it possible for F-secure to register a domain infected machines were due to contact and monitor what happened. Analysis by the firm, based on data from this experiment, suggests that 3.5m machines or more are under the control of unidentified hackers.
autoplay.jpg

By comparison, the Storm worm was made up of somewhere between 500,000 and 1m zombie drones at its September 2007 peak, according to one recent estimate.
Conficker began circulating in late November. As well as exploiting the MS08-067 vulnerability patched by Microsoft last October, brute forces administrator passwords in an attempt to spread across machines on the same local area network. The malware also infects removable devices and network shares using a special autorun.inf file.
Analysis of the code by security watchers at the Internet Storm Centre has revealed its use of clever social engineering ruses that means users plugging an infected drive into a Windows machine might be fooled into thinking they are only opening a folder when they are actually clicking to run the worm's viral payload.
Security experts suggest that users may want to disable Autorun, or even prohibit the use of USB devices, as a precaution. ®

Prolific worm infects 3.5m Windows PCs • The Register
 

My Computer

System One

  • Manufacturer/Model
    Acer Aspire 5920gmi notebook
    CPU
    Intel Core 2 Duo T7300 2.00GHz
    Memory
    4GB
    Graphics Card(s)
    NVIDIA GeForce 8600M GS
    Sound Card
    Realtek
    Screen Resolution
    1280 x 800 x 4294967296 colors
    Internet Speed
    crawl

My Computer

System One

  • Manufacturer/Model
    Dwarf Dwf/11/2012 r09/2013
    CPU
    Intel Core-i5-3570K 4-core @ 3.4GHz (Ivy Bridge) (OC 4.2GHz)
    Motherboard
    ASRock Z77 Extreme4-M
    Memory
    4 x 4GB DDR3-1600 Corsair Vengeance CMZ8GX3M2A1600C9B (16GB)
    Graphics Card(s)
    MSI GeForce GTX770 Gaming OC 2GB
    Sound Card
    Realtek High Definition on board solution (ALC 898)
    Monitor(s) Displays
    ViewSonic VA1912w Widescreen
    Screen Resolution
    1440x900
    Hard Drives
    OCZ Agility 3 120GB SATA III x2 (RAID 0)
    Samsung HD501LJ 500GB SATA II x2
    Hitachi HDS721010CLA332 1TB SATA II
    Iomega 1.5TB Ext USB 2.0
    WD 2.0TB Ext USB 3.0
    PSU
    XFX Pro Series 850W Semi-Modular
    Case
    Gigabyte IF233
    Cooling
    1 x 120mm Front Inlet 1 x 120mm Rear Exhaust
    Keyboard
    Microsoft Comfort Curve Keyboard 3000 (USB)
    Mouse
    Microsoft Comfort Mouse 3000 for Business (USB)
    Internet Speed
    NetGear DG834Gv3 ADSL Modem/Router (Ethernet) ~4.0 Mb/s (O2)
    Other Info
    Optical Drive: HL-DT-ST BD-RE BH10LS30 SATA Bluray
    Lexmark S305 Printer/Scanner/Copier (USB)
    WEI Score: 8.1/8.1/8.5/8.5/8.25
    Asus Eee PC 1011PX Netbook (Windows 7 x86 Starter)
Hi there.

Thanks a lot echrada for this detailed description.

Regarding conficker or however you call that little bugger, assuming a user using not the admin account, but just a user account with no admin rights (as it should be) falls for the trick you described and runs conficker in the autostart menu, is conficker blocked by the UAC of Vista to prevent conficker of doing whatever it wants to do? I read some infos that conficker is writing something in the registry as well as in the system32 folder and will download code after the next install onto the system, but can it do so without the admin access?

I have tried to get this information searching like for 2 hours now in the news and some forums. Of course it could be that I am just really stupid (I admit this is not totally unlikely) and I have overlooked this little detail in the news.

Thanks a lot for your answers!


Elsevier
 

My Computer

Back
Top