Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:25 PM
Wolfgang Kandek
Wolfgang Kandek

Conficker's Next Move

I recently attended a presentation about the current state of the Conficker worm, delivered by Felix Leder and Tillman Werner, two German security researchers from the University of Bonn.

I recently attended a presentation about the current state of the Conficker worm, delivered by Felix Leder and Tillman Werner, two German security researchers from the University of Bonn.It was a real privilege to meet them and exchange some thoughts since we at Qualys had been using their research work extensively since the end of March 2009, when the whole Conficker worm detection effort started.

Here is what is new: Conficker is still spreading. The latest results show we are dealing with more than 6 million infected IPs, up from 4 million in June. But in mid-July something happened that slowed the overall growth:


In July, Felix and Tillman used a quirk/feature of Conficker.A to neutralize the variant and stop it from spreading. On startup, Conficker.A consults a GeoIP database through the Internet, and if the IP address of the machine is located in the Ukraine, then it simply shuts down. The original GeoIP service being accessed had since decommissioned the URL used by Conficker (too much traffic and all nonproductive) and was willing to forward all requests to the University of Bonn, where Tillman and Felix started to serve a one-line version of the GeoIP database, putting all IPs squarely into the Ukraine. This slowed the spread of Conficker significantly as the difference in slope indicates. Very simple, smart, and effective.

The chart also shows this A variant, if left undeterred, will contribute significantly to the overall growth of Conficker. Given that Conficker.A uses exclusively the flaw patched in MS08-067 for its propagation method, a large quantity of vulnerable Windows machines still must be out on the Internet ready for infection. The threat in this situation is not that the Conficker worm will eventually get to these PCs, but that any enterprising bot author is able to write a new worm abusing the same flaw, with a high likelihood of building a major botnet.

Patch progress for MS08-067 is apparently slowing down, and the remaining machines will not get fixed without a major awareness campaign. As an alternative, should we work with the ISPs to help protect against this threat? One the major broadband providers in the U.S., Comcast, announced recently it will start monitoring its consumer network for botnets. So Comcast is apparently already thinking along those lines, as well.

-- As the CTO for Qualys, Wolfgang Kandek is responsible for product direction and all operational aspects of the QualysGuard platform and its infrastructure. Wolfgang has more than 20 years of experience in developing and managing information systems. His focus has been on Unix-based server architectures and application delivery through the Internet. Wolfgang provides the latest commentary on his blog: laws.qualys.com and also publishes his Patch Tuesday commentary to the QualysGuard channel: http://www.youtube.com/QualysGuard. He is a frequent source in business and trade media and speaks at industry conferences around the world, most recently at RSA 2009.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.
PUBLISHED: 2021-04-13
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.