Register
Results 1 to 5 of 5
  1. #1
    Admin Assistant
    caveman_nige's Avatar
    Join Date
    Feb 2008
    Location
    In my Cave
    Posts
    4,920
    Thanks Thanks Given 
    38
    Thanks Thanks Received 
    66
    Thanked in
    36 Posts

    Exclamation Three million hit by Windows worm

    BBC NEWS | Technology | Three million hit by Windows worm

    A worm that spreads through low security networks, memory sticks, and PCs without the latest security updates is posing a growing threat to users.

    The malicious program, known as Conficker, Downadup, or Kido was first discovered in October 2008.

    Although Microsoft released a patch, it has gone on to infect 3.5m machines.

    Experts warn this figure could be far higher and say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch.

    According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.

    It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.

    Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site.

    INFECTED IPs WORLDWIDE
    China 38,277
    Brazil 34,814
    Russia 24,526
    India 16,497
    Ukraine 14,767
    Italy 13,115
    Argentina 11,675
    Korea 11,117
    Romania 8,861
    United States 3,958
    United Kingdom 1,789
    Source: F-Secure


    Most malware uses one of a handful of sites to download files from, making them fairly easy to locate, target, and shut down.

    But Conficker does things differently.

    Anti-virus firm F-Secure says that the worm uses a complicated algorithm to generate hundreds of different domain names every day, such as mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the site used to download the hackers' files. On the face of it, tracing this one site is almost impossible.

    Speaking to the BBC, Kaspersky Lab's security analyst, Eddy Willems, said that a new strain of the worm was complicating matters.

    "There was a new variant released less than two weeks ago and that's the one causing most of the problems," said Mr Willems

    "The replication methods are quite good. It's using multiple mechanisms, including USB sticks, so if someone got an infection from one company and then takes his USB stick to another firm, it could infect that network too. It also downloads lots of content and creating new variants though this mechanism."

    "Of course, the real problem is that people haven't patched their software. If people do patch their software, they should have little to worry about," he added.

    Technicians have reverse engineered the worm so they can predict one of the possible domain names. This does not help them pinpoint those who created Downadup, but it does give them the ability to see how many machines are infected.

    "Right now, we're seeing hundreds of thousands of unique IP addresses connecting to the domains we've registered," F-Secure's Toni Kovunen said in a statement.

    "We can see them, but we can't disinfect them - that would be seen as unauthorised use."

    Microsoft says that the malware has infected computers in many different parts of the world, with machines in China, Brazil, Russia, and India having the highest number of victims.


  2. #2
    gmb45
    Guest

    Default

    Quote Originally Posted by caveman_nige View Post
    BBC NEWS | Technology | Three million hit by Windows worm

    A worm that spreads through low security networks, memory sticks, and PCs without the latest security updates is posing a growing threat to users.

    The malicious program, known as Conficker, Downadup, or Kido was first discovered in October 2008.

    Although Microsoft released a patch, it has gone on to infect 3.5m machines.

    Experts warn this figure could be far higher and say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch.

    According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.

    It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.

    Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site.

    INFECTED IPs WORLDWIDE
    China 38,277
    Brazil 34,814
    Russia 24,526
    India 16,497
    Ukraine 14,767
    Italy 13,115
    Argentina 11,675
    Korea 11,117
    Romania 8,861
    United States 3,958
    United Kingdom 1,789
    Source: F-Secure


    Most malware uses one of a handful of sites to download files from, making them fairly easy to locate, target, and shut down.

    But Conficker does things differently.

    Anti-virus firm F-Secure says that the worm uses a complicated algorithm to generate hundreds of different domain names every day, such as mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the site used to download the hackers' files. On the face of it, tracing this one site is almost impossible.

    Speaking to the BBC, Kaspersky Lab's security analyst, Eddy Willems, said that a new strain of the worm was complicating matters.

    "There was a new variant released less than two weeks ago and that's the one causing most of the problems," said Mr Willems

    "The replication methods are quite good. It's using multiple mechanisms, including USB sticks, so if someone got an infection from one company and then takes his USB stick to another firm, it could infect that network too. It also downloads lots of content and creating new variants though this mechanism."

    "Of course, the real problem is that people haven't patched their software. If people do patch their software, they should have little to worry about," he added.

    Technicians have reverse engineered the worm so they can predict one of the possible domain names. This does not help them pinpoint those who created Downadup, but it does give them the ability to see how many machines are infected.

    "Right now, we're seeing hundreds of thousands of unique IP addresses connecting to the domains we've registered," F-Secure's Toni Kovunen said in a statement.

    "We can see them, but we can't disinfect them - that would be seen as unauthorised use."

    Microsoft says that the malware has infected computers in many different parts of the world, with machines in China, Brazil, Russia, and India having the highest number of victims.
    tell you something nige its like viruses have a mind of there own, in the next 50 years or so computers will run everything on their own with little or no human input

  3. #3
    Admin Assistant
    caveman_nige's Avatar
    Join Date
    Feb 2008
    Location
    In my Cave
    Posts
    4,920
    Thanks Thanks Given 
    38
    Thanks Thanks Received 
    66
    Thanked in
    36 Posts

    Default

    Terminator 4 is out this summer, you will know then mate


  4. #4
    Admin Assistant
    caveman_nige's Avatar
    Join Date
    Feb 2008
    Location
    In my Cave
    Posts
    4,920
    Thanks Thanks Given 
    38
    Thanks Thanks Received 
    66
    Thanked in
    36 Posts

    Exclamation Clock ticking on worm attack code

    Experts are warning that hackers have yet to activate the payload of the Conficker virus.
    The worm is spreading through low security networks, memory sticks, and PCs without current security updates.
    The malicious program - also known as Downadup or Kido - was first discovered in October 2008.
    Although the spread of the worm appears to be levelling off, there are fears someone could easily take control of any and all of the 9.5m infected PCs.
    Speaking to the BBC, F-Secure's chief research officer, Mikko Hypponen, said there was still a real risk to users.
    "Total infections appear to be peaking. That said, a full count is hard, because we also don't know how many machines are being cleaned. But we estimate there are still more than 9m infected PCs world wide.
    "It is scary thinking about how much control they [a hacker] could have over all these computers. They would have access to millions of machines with full administrator rights.
    "But they haven't done that yet, maybe they're scared. That's good news. But there is also the scenario that someone else figures out how to activate this worm. That is a worrying prospect."
    Experts say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch. The patch is known as KB958644.

    Even having the Windows patch won't keep you safe


    Graham Cluley
    Sophos

    Speaking to the BBC, Graham Cluley, senior technology consultant with anti-virus firm Sophos, said the outbreak was of a scale they had not seen for some time.
    "Microsoft did a good job of updating people's home computers, but the virus continues to infect business who have ignored the patch update.
    "A shortage of IT staff during the holiday break didn't help and rolling out a patch over a large number of computers isn't easy.
    "What's more, if your users are using weak passwords - 12345, QWERTY, etc - then the virus can crack them in short order," he added.
    "But as the virus can be spread with USB memory sticks, even having the Windows patch won't keep you safe. You need anti-virus software for that."



    Method
    According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.
    It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.
    Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site.
    Most malware uses one of a handful of sites to download files from, making them fairly easy to locate, target, and shut down.
    But Conficker does things differently.
    Right now, we're seeing hundreds of thousands of [infected] unique IP addresses


    Toni Koivunen, F-Secure

    Anti-virus firm F-Secure says that the worm uses a complicated algorithm to generate hundreds of different domain names every day, such as mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the site used to download the hackers' files. On the face of it, tracing this one site is almost impossible.

    Variant
    Speaking to the BBC, Kaspersky Lab's security analyst Eddy Willems said that a new strain of the worm was complicating matters.
    "There was a new variant released less than two weeks ago and that's the one causing most of the problems," said Mr Willems
    "The replication methods are quite good. It's using multiple mechanisms, including USB sticks, so if someone got an infection from one company and then takes his USB stick to another firm, it could infect that network too. It also downloads lots of content and creating new variants though this mechanism.
    "Of course, the real problem is that people haven't patched their software," he added.
    Microsoft says that the malware has infected computers in many different parts of the world, with machines in China, Brazil, Russia, and India having the highest number of victims.


    BBC NEWS | Technology | Clock ticking on worm attack code


  5. #5
    Admin Assistant
    caveman_nige's Avatar
    Join Date
    Feb 2008
    Location
    In my Cave
    Posts
    4,920
    Thanks Thanks Given 
    38
    Thanks Thanks Received 
    66
    Thanked in
    36 Posts

    Exclamation Windows worm trickery for Vista

    The Conficker virus has opened a new can of worms for security experts.

    Drives such as USB sticks infected with the virus trick users into installing the worm, according to researchers.

    The "Autoplay" function in Vista and early versions of Windows 7 automatically searches for programs on removable drives.

    However, the virus hijacks this process, masquerading as a folder to be opened. When clicked, the worm installs itself.

    It then attempts to contact one of a number of web servers, from which it could download another program that could take control of the infected computer.

    Bad guys

    The worm is unusually clever in the way that it determines what server to contact, according to F-Secure's chief research officer Mikko Hypponen.

    "It uses a complicated algorithm which changes daily and is based on timestamps from public websites such as Google.com and Baidu.com," said Mr Hypponen in a blog post.

    "This makes it impossible and/or impractical for us good guys to shut them all down — most of them are never registered in the first place.

    "However, the bad guys only need to predetermine one possible domain for tomorrow, register it, and set up a website — and they then gain access to all of the infected machines," he added.

    It has also emerged that the virus automatically disables the automatic updates to Windows that would prevent further infection.

    As the virus - also known as Downadup - has spread to an estimated 9m computers globally, a number of high-profile instances of the virus have arisen.

    The Ministry of Defence has been battling an outbreak of the virus across its network for more than two weeks, and on Tuesday a network of hospitals across Sheffield told technology website The Register that more than 800 of their computers had been infected.

    Users are urged to download the KB958644 Security Update from Microsoft to mitigate the risk of infection.

    BBC NEWS | Technology | Windows worm trickery for Vista


 

 

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
This website uses cookies
We use cookies to store session information to facilitate remembering your login information, to allow you to save website preferences, to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.