. Military Space News .
Nasty worm wriggles into millions of computers

by Staff Writers
San Francisco (AFP) Jan 20, 2009
A nasty worm has wriggled into millions of computers and continues to spread, leaving security experts on Tuesday wondering whether the attack is a harbinger of evil deeds to come.

US software protection firm F-Secure says a computer worm known as "Conficker" or "Downadup" had infected more than nine million computers by Tuesday and was spreading at a rate of one million machines daily.

The malicious software had yet to do any noticeable damage, prompting debate as to whether it is impotent, waiting to detonate, or a test run by cybercriminals intent on profiting from the weakness in the future.

"This is enormous; possibly the biggest virus we have ever seen," said software security specialist David Perry of Trend Micro.

"I think the bad guys are field testing a new technology. If Conficker proves to work well, they could go out and sell malware (malicious software) to people. There is a huge market for selling criminal malware."

The worm, a self-replicating program, takes advantage of networks or computers that haven't kept up to date with security patches for Windows RPC Server Service.

It can infect machines from the Internet or by hiding on USB memory sticks carrying data from one computer to another. Once in a computer it digs deep, setting up defenses that make it hard to extract.

Malware could be triggered to steal data or turn control of infected computers over to hackers amassing "zombie" machines into "botnet" armies.

"Here we are with a big, big outbreak and they keep revamping their methodology to increase the size of it," Perry said. "They could be growing this huge botnet to slice it up and sell it on the criminal market."

Microsoft says it is aware of the Conficker "worm family" and has modified its free Malicious Software Removal Tool to detect and get rid of infections.

The US software giant also advises people to stay current on anti-virus tools and Windows updates, and to protect computers and files with strong passwords.

A troubling aspect of Conficker is that it harnesses computing power of a botnet to crack passwords.

Repeated "guesses" at passwords by a botnet have caused some computer users to be locked out of files or machines that automatically disable access after certain numbers of failed tries.

"Downadup uses brute force from the infected network of botnets to break the password of the machine being attacked," Perry said. "That is something never seen before and I find it disturbing."

Perry urges people to harden passwords by mixing in numbers, punctuation marks, and upper-case letters. Doing so makes it millions of times harder for passwords to be deduced, according to Perry.

"This is necessary in a world where malware hacks passwords," Perry said.

"Go get a notebook, keep it next to your computer and record your password in it. No hacker in the world can hack the written page locked away in your office."

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


British hacker fights extradition to US
London (AFP) Jan 20, 2009
A Briton accused of hacking into the computer systems of the US military and NASA would be at risk of psychosis or suicide if made to face trial in the United States, a London court heard Tuesday.







  • Walker's World: Realism, virtue and war
  • Military Matters: Coming wars -- Part 1
  • China calls on Obama to strengthen military ties
  • NATO chief hopes for French return at summit in April

  • Russian Strategic Bombers Conduct Patrols Over Arctic
  • North Korea, Afghanistan top Obama's Asian challenges
  • UN's Ban urges nuclear disarmament deal
  • NKorea says SKorea gripped by "war hysteria"

  • India admits failed cruise missile test
  • India test-fires supersonic cruise missile
  • Taiwan not impressed by reported Chinese plan to withdraw missiles
  • Javelin Joint Venture Awarded Contract For Command Launch Unit Upgrade

  • BMD Watch: New SBIRS software tested
  • Outside View: BMD priorities -- Part 5
  • Obama Takes The Football And Mitt Part Four
  • Obama Missile Defense Priorities Part Three

  • New Turbines Can Cut Fuel Consumption For Business Jets
  • Air China expects to post 'significant loss' for 2008
  • Nations demand climate plan from air, maritime industries
  • Heathrow expansion to get green light despite protests: reports

  • Training, UAVs, Key To Army Aviation In The Field
  • USAF Remains Committed To Unmanned Aircraft Systems
  • Boeing-Insitu ScanEagle Completes 1500 Shipboard Sorties With US Navy
  • Skylark 1 LE Selected By Israeli Ministry Of Defense

  • Pentagon readies 16-month Iraq withdrawal option for Obama
  • Iran to seek influence through Iraq elections: Pentagon
  • Analysis: KBR, U.S. critiqued by SIGIR
  • Dogs of War: Immunity and impunity

  • IAEA to investigate Gaza uranium ammunition allegations
  • A Whole New Type Of Protective Armour
  • Rockwell Collins To Provide HMD For Land Warrior Program
  • Russian RPG Line Remains Dominant

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement