Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:25 PM
Connect Directly

OpenDNS Reports 500,000 Machines Infected By Conficker

April Fool's Day was mostly quiet -- but the number of machines hit by Conficker.C are starting to roll in

Though the Conficker worm watch was mostly for naught, among the data rolling in from Wednesday's activity is an OpenDNS report that says 500,000 of its customers were infected with the worm's latest variant. "That number is more than I expected," says David Ulevitch, founder of OpenDNS. "We're not representative of the whole Internet, of course, but to me this indicates the infection for [Conficker] is probably larger than people expected."

OpenDNS, which provide a domain name service offering, also found that among its customers, Vietnam has the highest rate of Conficker.C infection, with 13.3 percent; followed by Brazil, 11.6 percent; the Philippines, 11.1 percent; Indonesia, 10.9 percent; Algeria, 7.3 percent; the U.S., 4.7 percent; and India, just less than 4.7 percent.

Vietnamese researchers at security firm BKIS, meantime, reported earlier today 1.3 million Conficker.C-infected machines. BKIS found that worldwide, China has the highest rate of infection, with 13.8 percent, followed by Brazil (10.4 percent) and Russia (9.3 percent), and with the U.S. in the 2 percent range.

British Telecom, meanwhile, said it detected more than 25 Conficker.C worm infection incidents among its U.S. customers' networks.

"In general, the level of sophistication of Conficker is impressive," OpenDNS's Ulevitch says. "It will continue to evolve to evade detection...but we haven't seen it doing anything malicious yet. It's scary in that regard."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-17
Adobe Download Manager versions have an insecure file permissions vulnerability. Successful exploitation could lead to privilege escalation.
PUBLISHED: 2019-10-17
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
PUBLISHED: 2019-10-17
An issue was discovered in Bitdefender BOX firmware versions before that affects the general reliability of the product. Specially crafted packets sent to the miniupnpd implementation in result in the device allocating memory without freeing it later. This behavior can cause the miniupn...
PUBLISHED: 2019-10-17
CA Performance Management 3.5.x, 3.6.x before 3.6.9, and 3.7.x before 3.7.4 have a default credential vulnerability that can allow a remote attacker to execute arbitrary commands and compromise system security.
PUBLISHED: 2019-10-17
The Deep Security Manager application (Versions 10.0, 11.0 and 12.0), when configured in a certain way, may transmit initial LDAP communication in clear text. This may result in confidentiality impact but does not impact integrity or availability.