Conficker
   HOME

TheInfoList



OR:

Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also i ...
that was first detected in November 2008. It uses flaws in Windows OS software and
dictionary attack In cryptanalysis and computer security, a dictionary attack is an attack using a restricted subset of a keyspace to defeat a cipher or authentication mechanism by trying to determine its decryption key or passphrase, sometimes trying thousands o ...
s on administrator passwords to propagate while forming a
botnet A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
, and has been unusually difficult to counter because of its combined use of many advanced malware techniques. The Conficker worm infected millions of computers including government, business and home computers in over 190 countries, making it the largest known computer worm infection since the 2003 Welchia. Despite its wide propagation, the worm did not do much damage, perhaps because its authors – believed to have been Ukrainian citizens – did not dare use it because of the attention it drew. Four men were arrested, and one pled guilty and was sentenced to four years in prison.


Prevalence

Estimates of the number of infected computers were difficult because the virus changed its propagation and update strategy from version to version. In January 2009, the estimated number of infected computers ranged from almost 9 million to 15 million. Microsoft has reported the total number of infected computers detected by its antimalware products has remained steady at around 1.7 million from mid-2010 to mid-2011. By mid-2015, the total number of infections had dropped to about 400,000, and it was estimated to be 500,000 in 2019.


History


Name

The origin of the name Conficker is thought to be a combination of the English term "configure" and the German pejorative term '' Ficker'' (engl. ''fucker''). Microsoft analyst Joshua Phillips gives an alternative interpretation of the name, describing it as a rearrangement of portions of the domain name trafficconverter.biz (with the letter k, not found in the domain name, added as in "trafficker", to avoid a "soft" c sound) which was used by early versions of Conficker to download updates.


Discovery

The first variant of Conficker, discovered in early November 2008, propagated through the Internet by exploiting a
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
in a network service (MS08-067) on
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was released to manufacturing on December 15, 1999, and was officiall ...
,
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Windows 2000 for high-end and ...
,
Windows Vista Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
,
Windows Server 2003 Windows Server 2003 is the sixth version of Windows Server operating system produced by Microsoft. It is part of the Windows NT family of operating systems and was released to manufacturing on March 28, 2003 and generally available on April 24, 2 ...
,
Windows Server 2008 Windows Server 2008 is the fourth release of the Windows Server operating system produced by Microsoft as part of the Windows NT family of the operating systems. It was released to manufacturing on February 4, 2008, and generally to retail on F ...
, and
Windows Server 2008 R2 Windows Server 2008 R2 is the fifth version of the Windows Server operating system produced by Microsoft and released as part of the Windows NT family of operating systems. It was released to manufacturing on July 22, 2009, and became generall ...
Beta. While Windows 7 may have been affected by this vulnerability, the Windows 7 Beta was not publicly available until January 2009. Although Microsoft released an emergency out-of-band patch on October 23, 2008 to close the vulnerability, a large number of Windows PCs (estimated at 30%) remained unpatched as late as January 2009. A second variant of the virus, discovered in December 2008, added the ability to propagate over LANs through removable media and
network share In computing, a shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network. It is a device or piece of information on a computer that can be remotely accessed from another compu ...
s. Researchers believe that these were decisive factors in allowing the virus to propagate quickly.


Impact in Europe

Intramar, the
French Navy The French Navy (french: Marine nationale, lit=National Navy), informally , is the maritime arm of the French Armed Forces and one of the five military service branches of France. It is among the largest and most powerful naval forces in t ...
computer network, was infected with Conficker on 15 January 2009. The network was subsequently quarantined, forcing aircraft at several airbases to be grounded because their flight plans could not be downloaded. The United Kingdom Ministry of Defence reported that some of its major systems and desktops were infected. The virus had spread across administrative offices, ''NavyStar/N*'' desktops aboard various Royal Navy warships and Royal Navy submarines, and hospitals across the city of
Sheffield Sheffield is a city in South Yorkshire, England, whose name derives from the River Sheaf which runs through it. The city serves as the administrative centre of the City of Sheffield. It is historically part of the West Riding of Yorkshire a ...
reported infection of over 800 computers. On 2 February 2009, the
Bundeswehr The ''Bundeswehr'' (, meaning literally: ''Federal Defence'') is the armed forces of the Federal Republic of Germany. The ''Bundeswehr'' is divided into a military part (armed forces or ''Streitkräfte'') and a civil part, the military part con ...
, the unified armed forces of Germany, reported that about one hundred of its computers were infected. An infection of
Manchester Manchester () is a city in Greater Manchester, England. It had a population of 552,000 in 2021. It is bordered by the Cheshire Plain to the south, the Pennines to the north and east, and the neighbouring city of Salford to the west. The t ...
City Council's IT system caused an estimated £1.5m worth of disruption in February 2009. The use of USB flash drives was banned, as this was believed to be the vector for the initial infection. A memo from the Director of the UK Parliamentary ICT service informed the users of the
House of Commons The House of Commons is the name for the elected lower house of the bicameral parliaments of the United Kingdom and Canada. In both of these countries, the Commons holds much more legislative power than the nominally upper house of parliament. T ...
on 24 March 2009 that it had been infected with the virus. The memo, which was subsequently leaked, called for users to avoid connecting any unauthorised equipment to the network. In January 2010, the
Greater Manchester Police Greater Manchester Police (GMP) is the territorial police force responsible for law enforcement within the metropolitan county of Greater Manchester in North West England. , Greater Manchester Police employed 6,866 police officers, 3,524 memb ...
computer network was infected, leading to its disconnection for three days from the
Police National Computer The Police National Computer (PNC) is a database used by law enforcement organisations across the United Kingdom and other Non-Law Enforcement Agencies. Originally developed in the early 1970s, PNC1 went 'live' in 1974 providing UK police forc ...
as a precautionary measure; during that time, officers had to ask other forces to run routine checks on vehicles and people.


Operation

Although almost all of the advanced malware techniques used by Conficker have seen past use or are well known to researchers, the virus's combined use of so many has made it unusually difficult to eradicate. The virus's unknown authors are also believed to be tracking anti-malware efforts from network operators and law enforcement and have regularly released new variants to close the virus's own vulnerabilities. Five variants of the Conficker virus are known and have been dubbed Conficker A, B, C, D and E. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, respectively. The Conficker Working Group uses namings of A, B, B++, C, and E for the same variants respectively. This means that (CWG) B++ is equivalent to (MSFT) C and (CWG) C is equivalent to (MSFT) D.


Initial infection

* Variants A, B, C and E exploit a vulnerability in the Server Service on Windows computers, in which an already-infected source computer uses a specially-crafted RPC request to force a
buffer overflow In information security and programming, a buffer overflow, or buffer overrun, is an anomaly whereby a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. Buffers are areas of memo ...
and execute shellcode on the target computer. On the source computer, the virus runs an
HTTP The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide We ...
server on a
port A port is a maritime facility comprising one or more wharves or loading areas, where ships load and discharge cargo and passengers. Although usually situated on a sea coast or estuary, ports can also be found far inland, such as H ...
between 1024 and 10000; the target shellcode connects back to this HTTP server to download a copy of the virus in DLL form, which it then attaches to svchost.exe. Variants B and later may attach instead to a running services.exe or
Windows Explorer File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file ...
process. Attaching to those processes might be detected by the application trust feature of an installed firewall. * Variants B and C can remotely execute copies of themselves through the ADMIN$ share on computers visible over
NetBIOS NetBIOS () is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, Ne ...
. If the share is password-protected, a
dictionary attack In cryptanalysis and computer security, a dictionary attack is an attack using a restricted subset of a keyspace to defeat a cipher or authentication mechanism by trying to determine its decryption key or passphrase, sometimes trying thousands o ...
is attempted, potentially generating large amounts of network traffic and tripping user account lockout policies. * Variants B and C place a copy of their DLL form in the ''recycle.bin'' of any attached removable media (such as USB flash drives), from which they can then infect new hosts through the Windows AutoRun mechanism using a manipulated ''autorun.inf''. To start itself at system boot, the virus saves a copy of its DLL form to a random filename in the Windows system or system32 folder, then adds registry keys to have svchost.exe invoke that DLL as an invisible network service.


Payload propagation

The virus has several mechanisms for pushing or pulling executable payloads over the network. These payloads are used by the virus to update itself to newer variants, and to install additional malware. * Variant A generates a list of 250
domain name A domain name is a string that identifies a realm of administrative autonomy, authority or control within the Internet. Domain names are often used to identify services provided through the Internet, such as websites, email services and more. As ...
s every day across five TLDs. The domain names are generated from a
pseudo-random number generator A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers whose properties approximate the properties of sequences of random numbers. The PRNG-generate ...
(PRNG) seeded with the current date to ensure that every copy of the virus generates the same names each day. The virus then attempts an HTTP connection to each domain name in turn, expecting from any of them a signed payload. * Variant B increases the number of TLDs to eight, and has a generator tweaked to produce domain names disjoint from those of A. ** To counter the virus's use of pseudorandom domain names, Internet Corporation for Assigned Names and Numbers (ICANN) and several
TLD A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet after the root domain. The top-level domain names are installed in the root zone of the name space. For all domains in ...
registries began in February 2009 a coordinated barring of transfers and registrations for these domains. Variant D counters this by generating daily a pool of 50,000 domains across 110 TLDs, from which it randomly chooses 500 to attempt for that day. The generated domain names were also shortened from 8–11 to 4–9 characters to make them more difficult to detect with
heuristics A heuristic (; ), or heuristic technique, is any approach to problem solving or self-discovery that employs a practical method that is not guaranteed to be optimal, perfect, or rational, but is nevertheless sufficient for reaching an immediate, ...
. This new pull mechanism (which was disabled until April 1, 2009) is unlikely to propagate payloads to more than 1% of infected hosts per day, but is expected to function as a seeding mechanism for the virus's peer-to-peer network. The shorter generated names, however, are expected to collide with 150–200 existing domains per day, potentially causing a distributed denial-of-service attack (DDoS) on sites serving those domains. However the large number of generated domains and the fact that not every domain will be contacted for a given day will probably prevent DDoS situations. * Variant C creates a
named pipe In computing, a named pipe (also known as a FIFO for its behavior) is an extension to the traditional pipe concept on Unix and Unix-like systems, and is one of the methods of inter-process communication (IPC). The concept is also found in OS/2 and ...
, over which it can push
URLs A Uniform Resource Locator (URL), colloquially termed as a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identifi ...
for downloadable payloads to other infected hosts on a
local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger ...
. * Variants B, C and E perform in-memory patches to NetBIOS-related DLLs to close MS08-067 and watch for re-infection attempts through the same vulnerability. Re-infection from more recent versions of Conficker are allowed through, effectively turning the vulnerability into a propagation backdoor. * Variants D and E create an ad-hoc peer-to-peer network to push and pull payloads over the wider Internet. This aspect of the virus is heavily obfuscated in code and not fully understood, but has been observed to use large-scale UDP scanning to build up a peer list of infected hosts and TCP for subsequent transfers of signed payloads. To make analysis more difficult, port numbers for connections are hashed from the
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
of each peer.


Armoring

To prevent payloads from being hijacked, variant A payloads are first
SHA-1 In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographically broken but still widely used hash function which takes an input and produces a 160-bit (20- byte) hash value known as a message digest – typically rendered as 40 hexadec ...
- hashed and RC4-
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can deci ...
with the 512-bit hash as a key. The hash is then RSA-signed with a 1024-bit private key. The payload is unpacked and executed only if its signature verifies with a
public key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic al ...
embedded in the virus. Variants B and later use MD6 as their hash function and increase the size of the RSA key to 4096 bits. Conficker B adopted MD6 mere months after it was first published; six weeks after a weakness was discovered in an early version of the algorithm and a new version was published, Conficker upgraded to the new MD6.


Self-defense

The DLL- Form of the virus is protected against deletion by setting its ownership to "''SYSTEM''", which locks it from deletion even if the user is granted with administrator privileges. The virus stores a backup copy of this DLL disguised as a .jpg image in the Internet Explorer cache of the user ''network services''. Variant C of the virus resets
System Restore System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used ...
points and disables a number of system services such as Windows Automatic Update, Windows Security Center, Windows Defender and
Windows Error Reporting Windows Error Reporting (WER) (codenamed Watson) is a crash reporting technology introduced by Microsoft with Windows XP and included in later Windows versions and Windows Mobile 5.0 and 6.0. Not to be confused with the Dr. Watson debuggin ...
. Processes matching a predefined list of antiviral, diagnostic or system patching tools are watched for and terminated. An in-memory patch is also applied to the system resolver DLL to block lookups of hostnames related to antivirus software vendors and the Windows Update service.


End action

Variant E of the virus was the first to use its base of infected computers for an ulterior purpose. It downloads and installs, from a web server hosted in Ukraine, two additional payloads: * Waledac, a spambot otherwise known to propagate through e-mail attachments. Waledac operates similarly to the 2008 Storm worm and is believed to be written by the same authors. * SpyProtect 2009, a
scareware Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes r ...
rogue antivirus product.


Symptoms

Symptoms of a Conficker infection include: * Account lockout policies being reset automatically. * Certain Microsoft
Windows service In Windows NT operating systems, a Windows service is a computer program that operates in the background. It is similar in concept to a Unix daemon. A Windows service must conform to the interface rules and protocols of the Service Control Manage ...
s such as Automatic Updates,
Background Intelligent Transfer Service Background Intelligent Transfer Service (BITS) is a component of Microsoft Windows XP and later iterations of the operating systems, which facilitates asynchronous, prioritized, and throttled transfer of files between machines using idle network ...
(BITS), Windows Defender and
Windows Error Reporting Windows Error Reporting (WER) (codenamed Watson) is a crash reporting technology introduced by Microsoft with Windows XP and included in later Windows versions and Windows Mobile 5.0 and 6.0. Not to be confused with the Dr. Watson debuggin ...
disabled. * Domain controllers responding slowly to client requests. * Congestion on local area networks (ARP flood as consequence of network scan). * Web sites related to
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
or the
Windows Update Windows Update is a Microsoft service for the Windows 9x and Windows NT families of operating system, which automates downloading and installing Microsoft Windows software updates over the Internet. The service delivers software updates for Wind ...
service becoming inaccessible. * User accounts locked out.


Response

On 12 February 2009, Microsoft announced the formation of an industry group to collaboratively counter Conficker. The group, which has since been informally dubbed the Conficker Cabal, includes
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washin ...
,
Afilias Afilias, Inc. is a US corporation that is the registry operator of the .info, .mobi and .pro top-level domain, service provider for registry operators of .org, .ngo, .lgbt, .asia, .aero, and a provider of domain name registry services for countri ...
, ICANN, Neustar,
Verisign Verisign Inc. is an American company based in Reston, Virginia, United States that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the , , and gene ...
,
China Internet Network Information Center The China Internet Network Information Center (), or CNNIC, is the administrative agency responsible for domain registry affairs of .cn under the Cyberspace Administration of China. Founded on 3 June 1997, it is now a government department based in ...
, Public Internet Registry, Global Domains International, M1D Global, America Online, Symantec,
F-Secure F-Secure Corporation is a global cyber security and privacy company, which has its headquarters in Helsinki, Finland. The company has offices in Denmark, Finland, France, Germany, India, Italy, Japan, Malaysia, Netherlands, Norway, Poland, Sweden, ...
, ISC, researchers from
Georgia Tech The Georgia Institute of Technology, commonly referred to as Georgia Tech or, in the state of Georgia, as Tech or The Institute, is a public research university and institute of technology in Atlanta, Georgia. Established in 1885, it is part of ...
, The Shadowserver Foundation, Arbor Networks, and Support Intelligence.


From Microsoft

On 13 February 2009, Microsoft offered a $USD250,000 reward for information leading to the arrest and conviction of the individuals behind the creation and/or distribution of Conficker.


From registries

ICANN has sought preemptive barring of domain transfers and registrations from all
TLD A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet after the root domain. The top-level domain names are installed in the root zone of the name space. For all domains in ...
registries affected by the virus's domain generator. Those which have taken action include: * On 13 March 2009, NIC Chile, the
.cl .cl is the Internet country code top-level domain (ccTLD) for Chile. It was created in 1987 and is administered by the University of Chile. Registration of second-level domains under this TLD is open to anyone, as established by the current reg ...
ccTLD registry, blocked all the domain names informed by the Conficker Working Group and reviewed a hundred already registered from the worm list. * On 24 March 2009, CIRA, the Canadian Internet Registration Authority, locked all previously-unregistered
.ca .ca is the Internet country code top-level domain (ccTLD) for Canada. The domain name registry that operates it is the Canadian Internet Registration Authority (CIRA). Registrants can register domains at the second level (e.g., ''example.ca'') ...
domain names expected to be generated by the virus over the next 12 months. * On 27 March 2009, NIC-Panama, the
.pa .pa is the Internet country code top-level domain (ccTLD) for Panama. It was first registered in 1994-05-25. It is administered by NIC Panamá, which is run by the Universidad Tecnologica de Panama. Because "PA" is also the postal code for the ...
ccTLD registry, blocked all the domain names informed by the Conficker Working Group. * On 30 March 2009,
SWITCH In electrical engineering, a switch is an electrical component that can disconnect or connect the conducting path in an electrical circuit, interrupting the electric current or diverting it from one conductor to another. The most common type of ...
, the Swiss
ccTLD A country code top-level domain (ccTLD) is an Internet top-level domain generally used or reserved for a country, sovereign state, or dependent territory identified with a country code. All ASCII ccTLD identifiers are two letters long, and all ...
registry, announced it was "taking action to protect internet addresses with the endings
.ch .ch is the country code top-level domain (ccTLD) for Switzerland in the Domain Name System of the Internet. Made available in 1987, only two years after .com, it is administered by SWITCH Information Technology Services. The domain ''ch'', as ...
and
.li .li is the Internet country code top-level domain (ccTLD) for Liechtenstein. The .li TLD was created in 1993. The domain is sponsored and administered by the University of Liechtenstein in Vaduz. Registration of .li domain names used to be manag ...
from the Conficker computer worm." * On 31 March 2009, NASK, the Polish ccTLD registry, locked over 7,000
.pl is the Internet country code top-level domain (ccTLD) for Poland, administered by NASK, the Polish research and development organization. It is one of the founding members of CENTR. History The domain was created in 1990, following the mit ...
domains expected to be generated by the virus over the following five weeks. NASK has also warned that worm traffic may unintentionally inflict a DDoS attack to legitimate domains which happen to be in the generated set. * On 2 April 2009, Island Networks, the ccTLD registry for Guernsey and
Jersey Jersey ( , ; nrf, Jèrri, label= Jèrriais ), officially the Bailiwick of Jersey (french: Bailliage de Jersey, links=no; Jèrriais: ), is an island country and self-governing Crown Dependency near the coast of north-west France. It is the l ...
, confirmed after investigations and liaison with the IANA that no
.gg .gg is the country code top-level domain for the Bailiwick of Guernsey. The domain is administered by Island Networks, who also administer the .je domain for neighbouring territory Jersey. The domain was chosen as other possible codes were al ...
or
.je .je is the country code top-level domain for Jersey. The domain is administered by Island Networks, who also administer the .gg domain for neighbouring territory Guernsey. In 2003, a Google Search website was made available for Jersey, which us ...
names were in the set of names generated by the virus. By mid-April 2009 all domain names generated by Conficker A had been successfully locked or preemptively registered, rendering its update mechanism ineffective.


Origin

Working group members stated at the 2009
Black Hat Briefings Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together ...
that
Ukraine Ukraine ( uk, Україна, Ukraïna, ) is a country in Eastern Europe. It is the second-largest European country after Russia, which it borders to the east and northeast. Ukraine covers approximately . Prior to the ongoing Russian inv ...
is the probable origin of the virus, but declined to reveal further technical discoveries about the virus's internals to avoid tipping off its authors. An initial variant of Conficker did not infect systems with Ukrainian IP addresses or with Ukrainian keyboard layouts. The payload of Conficker.E was downloaded from a host in Ukraine. In 2015, Phil Porras, Vinod Yegneswaran and Hassan Saidi – who were the first to detect and reverse-engineer Conficker – wrote in the '' Journal of Sensitive Cyber Research and Engineering'', a classified, peer-reviewed U.S. government cybersecurity publication, that they tracked the malware to a group of Ukrainian cybercriminals. Porras ''et al.'' believed that the criminals abandoned Conficker after it had spread much more widely than they assumed it would, reasoning that any attempt to use it would draw too much attention from law enforcement worldwide. This explanation is widely accepted in the cybersecurity field. In 2011, working with the FBI, Ukrainian police arrested three Ukrainians in relation to Conficker, but there are no records of them being prosecuted or convicted. A Swede, Mikael Sallnert, was sentenced to 48 months in prison in the U.S. after a guilty plea.


Removal and detection

Due to the lock of the virus files against deletion as long as the system is running, the manual or automatic removal itself has to be performed during boot process or with an external system installed. Deleting any existing backup copy is a crucial step. Microsoft released a removal guide for the virus, and recommended using the current release of its Windows Malicious Software Removal Tool to remove the virus, then applying the patch to prevent re-infection. Newer versions of Windows are immune to Conficker.


Third-party software

Many third-party anti-virus software vendors have released detection updates to their products and claim to be able to remove the worm. The evolving process of the malware shows some adoption to the common removal software, so it is likely that some of them might remove or at least disable some variants, while others remain active or, even worse, deliver a false positive to the removal software and become active with the next reboot.


Automated remote detection

On 27 March 2009, Felix Leder and Tillmann Werner from the Honeynet Project discovered that Conficker-infected hosts have a detectable signature when scanned remotely. The
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
command protocol used by variants D and E of the virus has since been partially
reverse-engineered Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
, allowing researchers to imitate the virus network's command packets and positively identify infected computers en-masse. Signature updates for a number of network scanning applications are now available. It can also be detected in passive mode by sniffing
broadcast domain A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment or it can be bridged to other LAN segments. In ...
s for repeating ARP requests.


US CERT

The
United States Computer Emergency Readiness Team The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Specifically, US-CERT is a branch of the Office of ...
(US-CERT) recommends disabling AutoRun to prevent Variant B of the virus from spreading through removable media. Prior to the release of Microsoft knowledgebase article KB967715, US-CERT described Microsoft's guidelines on disabling Autorun as being "not fully effective" and provided a workaround for disabling it more effectively. US-CERT has also made a network-based tool for detecting Conficker-infected hosts available to federal and state agencies.


See also

*
Botnet A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
*
Timeline of notable computer viruses and worms A timeline is a display of a list of events in chronological order. It is typically a graphic design showing a long bar labelled with dates paralleling it, and usually contemporaneous events. Timelines can use any suitable scale representi ...
*
Bot herder Bot herders are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program. The infected machine then has become one o ...
* Network Access Protection *
Zombie (computer science) In computing, a zombie is a computer connected to the Internet that has been computer security, compromised by a Hacker (computer security), hacker via a computer virus, computer worm, or Trojan horse (computing), trojan horse program and can b ...
* Malware


References


External links


Conficker Working GroupConficker Working Group -- Lessons LearnedWorm: The First Digital World War
by
Mark Bowden Mark Robert Bowden (; born July 17, 1951) is an American journalist and writer. He is a national correspondent for ''The Atlantic''. He is best known for his book '' Black Hawk Down: A Story of Modern War'' (1999) about the 1993 U.S. military r ...
(2011; )
"The 'Worm' That Could Bring Down The Internet"
author interview (audio and transcript), ''
Fresh Air ''Fresh Air'' is an American radio talk show broadcast on National Public Radio stations across the United States since 1985. It is produced by WHYY-FM in Philadelphia, Pennsylvania. The show's host is Terry Gross. , the show was syndicated to ...
'' on
NPR National Public Radio (NPR, stylized in all lowercase) is an American privately and state funded nonprofit media organization headquartered in Washington, D.C., with its NPR West headquarters in Culver City, California. It differs from other ...
, September 27, 2011; preliminarily covered by Bowden in ''Atlantic'' magazine articl
"The Enemy Within"
(June 2010). {{Hacking in the 2000s Computer worms Hacking in the 2000s