The Conficker worm has been a hot topic for months as white hats and black hats have struggled to one-up each other. When security teams broke the randomization cypher Conficker uses and were able to predict which websites the program would target and when, Conficker.B retaliated. That version of the malware used a new encryption cypher to hide its target list (this was broken as well), and was cabable of spreading from infected to non-infected systems over office networks, shared folders, or even USB keys.
Now we’ve come to round C, an event the security industry has been preparing to fight for at least a month. The behavior of previous Conficker versions has been analyzed in order to prepare a defense against Conficker.C, in the hopes of stopping the worm once and for all. As of this writing—near the end of April 1, Conficker.C’s supposed launch date—have researchers succeeded in slamming down a bulkhead to contain the worm?
Based on what we’ve seen today, the answer is a very cautious “maybe.” Conficker is awake and has been seen “in the wild” as various infected systems reached out to the control servers for data. New scanning technologies developed by Dan Kaminsky at Dox Para in cooperation with Felix Leder and Tillmann Werner have made it possible to detect a Conficker-infected system based on how it responds to certain queries.
Loading comments...