Conficker botnet stirs to distribute update payload - Techist - Tech Forum

Go Back   Techist - Tech Forum > Security | Computer, Devices, Software and Systems > Viruses, Spyware and Malware
Click Here to Login
Closed Thread
 
Thread Tools Display Modes
 
Old 04-09-2009, 08:23 AM   #1 (permalink)
Techie Beyond Description
 
Osiris's Avatar
 
Join Date: Jan 2005
Location: Kentucky
Posts: 36,817
Send a message via ICQ to Osiris Send a message via AIM to Osiris Send a message via MSN to Osiris Send a message via Yahoo to Osiris
Default Conficker botnet stirs to distribute update payload

The Conficker superworm is stirring, with the spread of a new variant that spreads across P2P and drops a payload. It is thought to update machines infected by earlier strains of the worm.
Conficker-E (the latest variant) offers potential clues on the origins of the worm, because of possible links to other malware. Trend Micro reports that the new Downadup/Conficker variant is talking to servers associated with the Waledac family of malware, in order to download further unwanted items.


Waledec, in turn, is suspected as the latest item of malware from the gang behind the Storm botnet, sparking speculation that all three strains of botnet client are the work of the same cybercriminal gang.

A preliminary analysis by Symantec suggests that PCs infected by earlier variants are getting updates.
On April 8, 2009 we discovered a new sample that is a slightly modified version of the original W32.Downadup worm. The worm previously updated its functionality with the .C variant which installed on top of the .B variant infections, and we are now seeing the same type of update happening on top of the .A variant infections. This new sample reintroduces the MS08-067 exploit vector, which was removed in the .C variant. It includes previously unseen self-removal functionality to remove itself from the infected host on May 3, 2009. The new sample includes a slightly different list of URLs used to obtain the IP address of the infected host and also reaches out to a new list of high-profile domains to confirm the current date. When reaching out to these domains the threat is not exploiting any weakness nor downloading any code.
We have also observed a possible connection to W32.Waledac, one of the most active spam bots, and have some circumstantial evidence that the two may be linked with W32.Downadup.C distributing W32.Waledac. W32.Waledac steals sensitive information, turns computers into spam zombies, and establishes a back door remote access. Symantec products provide antivirus and IPS protection for Waledac.
This new sample does not appear to include any new infection vectors that might allow the threat to spread faster or onto new machines.
The latest variant of Conficker uses randomly generated ports between the ranges of 1024 and 10000 to communicate and propagate. Analysis of the malware, detected on Wednesday night, remains ongoing.
The malware components downloaded by the new version of Conficker may not themselves be anything new. Patrik Runald, chief security advisor at F-Secure, reports that his firm (at least) has detected these components since 30 December.
At the time of writing there's no evidence that access to the Conficker botnet is being used to send spam, launch denial of service attacks or any other nefarious activity normally associated with compromised PCs.

Conficker botnet stirs to distribute update payload ? The Register
__________________

__________________
Osiris is offline  
Old 04-09-2009, 09:19 AM   #2 (permalink)
Banned
 
Join Date: Feb 2009
Location: Guantanomo Bay, Cuba
Posts: 546
Default Re: Conficker botnet stirs to distribute update payload

Oh, but I thought Conficker was "a dud"????
__________________

SparkMonkeyHellion is offline  
Old 04-09-2009, 09:32 AM   #3 (permalink)
Techie Beyond Description
 
Osiris's Avatar
 
Join Date: Jan 2005
Location: Kentucky
Posts: 36,817
Send a message via ICQ to Osiris Send a message via AIM to Osiris Send a message via MSN to Osiris Send a message via Yahoo to Osiris
Default Re: Conficker botnet stirs to distribute update payload

It's a dud in the fact that it didn't anything on April 1. But, it does what most spyware, malware, etc does, spams, popups, network traffic, etc.
__________________
Osiris is offline  
Old 04-10-2009, 09:50 PM   #4 (permalink)
Master Techie
 
Join Date: Feb 2005
Posts: 2,010
Default Re: Conficker botnet stirs to distribute update payload

Same basic article but another source

Conficker flickers into life

"What was thought to be little more than an April Fool's Day joke is beginning to look a little more sinister after the Conficker worm began to turn in the last 24 hours.

As April 1 came and went, the world began thinking that the hype surrounding the Conficker were was basically just that. However, according to anti-virus firm Trend Micro, it announced on April 7 that it had discovered a new variant of the Conficker worm had begun circulating from a known internet-protocol (IP) Conficker address, most likely controlled by servers in Korea.

The new variant is called WORM_DOWNAD.E and manages to run using random file and service names and is able to connect to a raft of high-profile websites including eBay, MySpace, CNN, AOL and MSN.

The Conficker worm exposes security holes in a range of Microsoft operating systems including Windows Vista and Windows XP.

Reports are suggesting that Conficker is gearing up to control as many as 11million infected computers for money-making rather than data-destroying enterprises although at this stage, nothing can be ruled in or out.

Conficker exploits a security hole that allows remote execution of code that is downloaded from infected websites. The downloaded code then makes changes to the computer's TCP-IP settings, allowing the worm to spread itself further as well as co-opt the user's internet connection for its own purposes.It also disables restore points and blocks access to certain security websites."

link:
techlogg.com - Conficker flickers into life
__________________
AMD Ryzen 5 1400 3.2Ghz
16GB CORSAIR Vengeance LPX DDR4 2400 Ram
Crucial M500 240GB SSD (boot drive)
500GB WD 5000AAKX-001CA0
1.5 TB Seagate ST1500DM003
Zotac Geforce GTX 950 2GB GDDR5
Windows 10 Pro 64 bit
mikee is offline  
Old 04-27-2009, 10:52 AM   #5 (permalink)
Banned
 
Join Date: Feb 2009
Location: Guantanomo Bay, Cuba
Posts: 546
Default Re: Conficker botnet stirs to distribute update payload

Anyone know anything more specific about what Conficker could be doing lately? We've had quite a few spam attacks just sprout up for seemingly no reason.
SparkMonkeyHellion is offline  
Closed Thread

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Conficker zombie botnet drops to 3.5 million Osiris Viruses, Spyware and Malware 0 04-03-2009 07:37 AM
Conficker botnet remains dormant Osiris Viruses, Spyware and Malware 0 04-01-2009 08:00 AM
Conficker worm back with a vengeance Osiris Viruses, Spyware and Malware 6 04-01-2009 12:20 AM
Conficker Information Osiris Viruses, Spyware and Malware 7 03-31-2009 09:50 PM
prep for HijackThis Log posting paulmars HijackThis Logs (finished) 38 02-03-2009 06:51 PM



Copyright 2002- Social Knowledge, LLC All Rights Reserved.

All times are GMT -5. The time now is 06:09 PM.


Powered by vBulletin® Version 3.8.8 Beta 1
Copyright ©2000 - 2017, vBulletin Solutions, Inc.