[LINK] Internet meltdown threat: Conficker worm refuses to turn
Bernard Robertson-Dunn
brd at iimetro.com.au
Tue Sep 22 17:23:17 AEST 2009
Internet meltdown threat: Conficker worm refuses to turn
Asher Modes
September 22, 2009 - 12:08PM
http://www.watoday.com.au/technology/security/internet-meltdown-threat-conficker-worm-refuses-to-turn-20090922-fzlh.html
The brightest minds in technology and government are finding it "almost
impossible" to defeat the Conficker worm, which has infected more than 5
million computers and, experts say, could be used to knock down the
internet in entire countries.
The worm, first detected in November last year, spreads rapidly to
computers through a flaw in the Windows operating system.
Infected machines are co-opted into a "botnet" army, which can be
controlled and used by the hackers to launch unprecedented cyber attacks.
"The general agreement in the security world is that Conficker is the
largest threat facing us from a cyber crime point of view ... it has
proven to be extremely resilient. It's almost impossible to remove,"
said Rodney Joffe, a director of the Conficker Working Group formed to
defeat the worm.
"The best minds in the world have not managed to crack the code behind
this yet."
The scale of the threat has forced the world's largest computer security
companies to join together with government around the world in an
unusual alliance to pool their resources and solve the problem.
Microsoft has offered a $US250,000 ($290,000) reward for information
leading to the identification of the individuals - or rogue governments
- behind Conficker.
Those behind the worm can do anything they want with the infected
machines including stealing users' banking details or flooding
government servers to knock them offline.
"This could be used to launch the mother of all DDoS [distributed denial
of service] attacks, it could be used as the basis of major financial
fraud, it could be used for major spam runs," Joffe said.
"Even a small portion of the infected machines from Conficker have the
ability to actually take away the usability of the internet in an entire
country like Australia."
So far the international effort to find a solution has yielded few
results, and the number of infected machines has remained fairly stable
at 5 million. They include home, business and Government computers.
Joffe, who is also a senior technologist at US communications company
Neustar, explained that the remarkable resilience was because Conficker
had built-in mechanisms to prevent people from scanning their computers
with anti-virus software. Even for those who wipe their computers clean
and start fresh, if they back up any important data on a portable hard
drive, the clean machine is reinfected when the drive is connected to
the computer.
The worm also spreads automatically between computers on a network and
infects machines without the user having to do anything other than
switch their computers on.
"If you've been able to disinfect 99 machines out of 100 and one is
still infected, it will begin to try to reinfect the others," Joffe said.
Most other botnets can be destroyed by disabling the server used to
issue commands to infected machines, but with Conficker the location of
this sever changes every day and state-of-the-art cryptography means
it's almost impossible to crack.
Every time the security gurus feel they are on to a solution, the
hackers send a new version of Conficker to the infected machines that
stops them in their tracks.
"Conficker has proven to be the gold standard for botnets. It's rock
solid, it's steady and it has mechanisms built in that have made it
impossible for us to actually crack," Joffe said.
"As of today we have not been able to crack the cryptography behind it
in order to disrupt it by authenticating ourselves as the command and
control."
So far the "botnet masters" have been biding their time as the media
buzz around Conficker dies down, but they have already sent malicious
code to infected machines that co-opts them to send spam emails. Users
of infected computers have also been conned with offers to buy fake
anti-virus software.
In July, Manchester City Council in Britain was prevented from issuing
hundreds of fines after Conficker knocked out parts of its IT system.
The infection cost the council £1.5 million in total.
In January, the French Navy had to quarantine its computer network after
it was infected with Conficker, forcing aircraft at several air bases to
be grounded.
Joffe said that people who are not yet infected and have installed the
latest Windows patches and anti-virus software should be safe, as long
as yet another version of Conficker is not released.
But he said it was rare for people to have all the relevant patches
installed on their computers, and anti-virus software would be of little
use to those already infected.
"We're some ways away from being able to take any action, which is what
is really concerning us," Joffe said.
--
Regards
brd
Bernard Robertson-Dunn
Canberra Australia
brd at iimetro.com.au
More information about the Link
mailing list