Endpoint
4/25/2012
02:32 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

Microsoft: Conficker Worm Remains 'Ongoing' Threat

Three-year-old 'dead' Windows worm infection is still spreading -- mainly via weak or stolen passwords, new Microsoft report says

The orphaned botnet worm Conficker spread to 1.7 million Windows machines worldwide by the end of last year despite a major industry initiative led by Microsoft over the past three years that neutered it.

The Conficker Working Group, headed by Microsoft, effectively shut down Conficker's underlying botnet infrastructure more than two years ago; at the time, there were some 6.5 million infected machines. But the Conficker worm, which was written to automatically spread via weak passwords and vulnerabilities that were later patched by Microsoft, lives on in its decapitated form in a shocking number of Windows machines in businesses, according to new data published in Microsoft's newest Security Intelligence Report (SIR) Version 12.

Microsoft says the worm continues to spread, mostly through enterprises and via some overlooked best-practice security precautions: Ninety-two percent of the Conficker infections came through weak or stolen passwords, and 8 percent through unpatched systems. The worm was found 220 million times during the past two-and-a-half years, and quarterly infections of Conficker have risen by more than 225 percent since the beginning of 2009.

While the malware itself doesn't do any actual harm to the machine besides live in it and spread to other machines, it has exposed a major security no-no among many enterprises: weak and easily guessable passwords, security experts say, as well as lags in patching.

Conficker has become a sort of basic vulnerability assessment for these infected organizations. "It's turning out to be a nuisance to the enterprise ... It does concern security pros: If an automated threat can get into an enterprise and stay, it demonstrates that they have some vulnerabilities in their environment. If a well-known threat can get in, what about targeted attacks using the same [vectors]?" says Tim Rains, director of Microsoft Trustworthy Computing.

Rains says there's no real threat of Conficker re-emerging as a botnet right now, and no new variants have been spotted for about two-and-a-half years. But even merely harboring a benign worm in your corporate Windows machines is problematic, he says. "For some enterprises, any threat can be a serious threat. They have to run networks in a manner that allows them to be compliant with the law, and having a piece of malware running around concerns security folks," Rains says. "The other point is having an automated worm that has a well-known list of tactics ... and that AV can block. It's concerning to have this show up in a professionally managed" environment, he says.

[After more than a year of waiting for the sleeping giant Conficker botnet to come to life, security researchers called it dead rather than dormant as its creators appear to have abandoned ship, leaving the worm to merely spread on its own via unpatched Windows machines. See Conficker Botnet 'Dead In the Water,' Researcher Says.]

Conficker's apparent stubborn grip on enterprise Windows machines is an eye-opener, according to Wolfgang Kandek, CTO at Qualys. "This is a case study of malware we happen to know really well, and it shows where our problems lie," Kandek says. "We are able to see Conficker succeed with the bad password policies they have. For me, that would be the eye-opening piece: some very basic security failures in the way enterprises run their networks and enforce things such as password policy."

Among the passwords that Conficker searches for are the usual lazy and weak ones: 0000; 1111, 123123; Admin; Admin1; coffee; temp; test; and work.

Microsoft also found that nearly 10 percent of organizations had not installed the MS08-067 patch from Microsoft that protects Windows from Conficker. "The remaining 8% of Conficker-infected systems just didn't have the patch installed (MS08-067). Note that this patch is nearly four years old," said Andrew Storms, director of security operations for nCircle, in a blog post today. "I suppose there are some IT people out there that have had the patch for four years and just haven’t gotten around to installing it yet. It's far more likely though, that the IT team just didn't know these systems are on their networks and need to be patched."

According to the Microsoft SIRv12, 91 percent of Conficker-infected Windows 2003 machines were hit via weak or stolen passwords, and 9 percent via an exploit. For Windows 7 and Vista machines hit by Conficker, 100 percent were hit via weak or stolen passwords, while 88 percent of XP machines were infected that way, and 12 percent via exploit.

Conficker steals an admin password after infecting an endpoint, and then uses those privileged credentials to log into all other machines in the network and infect them as well. When an administrator logs into an infected computer to troubleshoot or clean it, for example, Conficker uses that admin's credentials to spread to other machines.

The SIRv12 report also found that many targeted attacks -- often called advanced persistent threats (APTs) -- really aren't so sophisticated or advanced. Most of them employ the same attack vectors as wide-scale attacks such as Conficker: exploiting weak or stolen passwords, unpatched vulnerabilities, and social engineering. Microsoft doesn't use the term APT, but rather targeted attacks by determined adversaries, because calling these "advanced" can be "misleading," Rains said in a statement.

Meanwhile, Qualys' Kandek was shocked at the high rate of Conficker infections still under way. "I was not aware there was such a huge number of new infections going on," he says. "We need to work much better on the [security] basics.

"Conficker is a well-written piece of software. We still see the effects of that. I think we could, but haven't tried hard enough to get it out of systems."

A copy of the full Microsoft SIRv12 is available for download here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jlewis210
50%
50%
jlewis210,
User Rank: Apprentice
4/29/2012 | 9:54:55 PM
re: Microsoft: Conficker Worm Remains 'Ongoing' Threat
The count I have so far for April, is 14+ million unique IPs with over 19+ million unique user agents. -ŠTo only count the infected IPs significantly underestimates the infection numbers.

There are single IPs with over 1000 infected hosts.-Š

The real risk with conficker is that it disables AV software, so these system are at higher risk to be infected with other malware.
Bprince
50%
50%
Bprince,
User Rank: Ninja
4/27/2012 | 11:45:39 PM
re: Microsoft: Conficker Worm Remains 'Ongoing' Threat
I agree with the previous poster. I have to say though I am still surprised by the numbers.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
lipanitech
50%
50%
lipanitech,
User Rank: Apprentice
4/26/2012 | 2:56:02 PM
re: Microsoft: Conficker Worm Remains 'Ongoing' Threat
To me this Conflickr virus was the new blaster. Microsoft patched this
vulnerability long before the virus hit the problem is a lot of IT
professionals and home users do not realize the important of patching
and a good anti-virus.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web