'Obstinate' Conficker worm infests millions of PCs years later
Suppressed botnet has 7M Windows machines in its grip three years after it first appeared
Computerworld - Microsoft yesterday said the long-suppressed Conficker botnet is still actively infecting millions of new machines, giving Windows enterprise users a two-and-a-half-year headache.
Conficker infected or tried to infect an amazing 1.7 million Windows PCs in the fourth quarter of 2011, three years after it first raised its hydra heads. The 1.7 million was an uptick of 100,000 from the previous quarter, said Microsoft.
"Users are still struggling and battling with Conficker," Tim Rains, a director in Microsoft's Trustworthy Computing group, said in an interview earlier this week. "It's surprising that it has this kind of staying power."
The worm first appeared in the fall of 2008, exploiting a just-patched Windows vulnerability. It soon morphed into a much more effective threat, adding new attack techniques, including one that relied on weaknesses in Windows XP's and Vista's AutoRun feature. By January 2009, some security firms estimated that Conficker had compromised millions of PCs.
Concern about Conficker reached a crescendo when the mainstream media, including major television networks, reported that the worm would update itself on April 1, 2009. Because of the size of the Conficker botnet -- estimates ran as high as 12 million at that point -- and other mysteries, hype ran at fever pitch.
In the end, Conficker's April 1 update passed quietly. But the worm, although prevented from communicating with its makers, hasn't gone quietly into the night.
"It's still out there and active," Rains said. "It's been the number one threat in the enterprise for the last two-and-a-half years."
According to Microsoft -- which collects data from its Malicious Software Removal Tool (MSRT), a free utility it distributes to all Windows users each month, its antivirus software, its Bing search engine and the Hotmail email service -- detections of Conficker have jumped 225% since 2009.
The current size of the Conficker botnet -- those PCs now infected -- is approximately seven million, Microsoft claimed.
Fortunately, Conficker-infected systems are unable to receive updates or orders from the hackers who made the malware.
The Conficker Working Group, a cabal of security researchers and companies, among them Microsoft, has been blocking the worm's command-and-control (C&C) domains since early 2009. By "sinkholing" those domains -- registering all possible C&C domains before the hackers do -- the group has prevented Conficker-infected PCs from doing any real harm. Commands issued to the botnet fall down a metaphoric "sinkhole" and don't reach the compromised computers.
But the persistence of Conficker -- Microsoft called the worm "obstinate" -- means that the working group has a tiger by the tail, and can't let loose. If the group stops its sinkholing efforts, the millions of PCs infected with the worm could again revert to hacker control.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts