. Military Space News .
Conficker worm dabbling with mischief

by Staff Writers
San Francisco (AFP) April 28, 2009
The Conficker worm's creators are evidently toying with ways to put the pervasive computer virus to work firing off spam or spreading rogue anti-virus applications called "scareware."

An April update sent to a tiny percentage of infected computers had the machines retrieve components of notorious Storm and Waledac worms unleashed in past years to create armies of "botnets" -- automated crime networks -- for spreading spam or scareware.

"It looks like these guys are perhaps testing the waters to see which one of those would be a better money-maker for them," Trend Micro advanced threats researcher Paul Ferguson said Monday of Conficker's masters.

"We have always suspected that the people behind this would not sit idly by without trying to make money off this somehow. Spamming and rogue anti-virus are pretty lucrative for these guys."

Ties to components of Storm and Waledac signal that Conficker's creators were likely involved with the other computer worms, according to security specialists.

"This connects the dots that the same people behind Conficker are the people behind Waledac and Storm," Ferguson said, noting that evidence is pointing to an organized hacker enterprise in the Ukraine.

"These are well-funded organized cyber-criminals in Eastern Europe. They want to steal people's money out of their pockets without being noticed. This same criminal operation is very business savvy."

Hackers are increasingly hiding viruses in bogus computer security software to trick people into installing treacherous programs on machines, Microsoft warned earlier this month.

Rogue security software referred to as "scareware" pretends to check computers for viruses, and then claims to find dangerous infections that the program will fix for a fee.

"The rogue software lures them into paying for protection that, unknown to them, is actually malware offering little or no real protection, and is often designed to steal personal information," Microsoft said.

Hackers have been capitalizing on hype and fear surrounding Conficker to trick people into loading scareware onto computers.

A task force assembled by Microsoft has been working to stamp out Conficker, also referred to as DownAdUp, and the software colossus has placed a bounty of 250,000 dollars on the heads of those responsible for the threat.

The worm, a self-replicating program, takes advantage of networks or computers that haven't kept up to date with security patches for Windows.

It can infect machines from the Internet or by hiding on USB memory sticks carrying data from one computer to another.

Conficker could be triggered to steal data or turn control of infected computers over to hackers amassing "zombie" machines into "botnet" armies.

Ferguson believes Conficker's creators are out for cash, not wanton destruction, but that the worm's spread is a sobering reminder that botnets could be turned against Internet-linked parts of national infrastructures.

"How do you rationalize connecting critical networks to the Internet when those kinds of attacks are possible?" Ferguson asked rhetorically.

"We used to joke that the only guarantee for 100 percent security is a pair of wire cutters."

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Greater Transparency Needed In Development Of US Policy On Cyberattacks
Washington DC (SPX) May 01, 2009
The current policy and legal framework regulating use of cyberattack by the United States is ill-formed, undeveloped, and highly uncertain, says a new report from the National Research Council.







  • The Future Of NATO Part Five
  • Australia must boost military to deal with China rise: think tank
  • Future Of NATO Will Be Determined In Afghanistan Part Six
  • NATO Bloated And Weakened From Expansion Part Two

  • NKorea vows to conduct nuclear test unless UN apologises
  • Clinton frets over Chinese, Iranian inroads in Americas
  • Russia Defense Watch: Arctic force denial
  • Outside View: If Pakistan fails -- Part 2

  • USAF Awards Raytheon Contract For Laser-Guided Maverick Missile
  • Raytheon Standard Missile-2 Destroys Target
  • Indian tests cruise missile: official
  • US says warships deployed before NKorea launch

  • Boeing-IAI Missile Defense Interceptor Shoots Down Target
  • BMD Focus: Israel buys the Phalanx
  • BMD Watch: Israel's Arrow hits missile
  • Seeking New BMD Strategies Part One

  • Faster Than The Speed Of Sound
  • China Eastern Airlines reports huge loss in 2008
  • Airlines fear failure of global climate talks
  • State takes control of China's first private airline: report

  • CCUVS Deploys Robonic UAS Launcher On First Operational Mission
  • Boeing Demonstrates Command And Control Of ScanEagle From Wedgetail
  • Raven UAS Achieves 30-Hour Persistent Surveillance
  • Russia Defense Watch: UAVs from Israel

  • Iraqi police arrest leader of Saddam-allied insurgents
  • It will take Iraq time to put down extremists: Petraeus
  • US must stay engaged in Iraq despite Afghanistan: analysts
  • Suicide bomber wounds 38 at Iraqi army base

  • Raytheon's GBU-53/B Small Diameter Bomb II Completes First Flight
  • Future Lynx Is Now The AW159
  • Blue Flag Enhances Ability To Protect US
  • Turkey Buys 36 LEGUAN Bridge Laying Armoured Vehicles

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement