Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Countdown to Conficker

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
tekisui Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 06:42 PM
Original message
Countdown to Conficker
Source: cnetnews

The Conficker worm is stirring on some infected computers in Asia where it's April 1, but so far the activity is very tame, security researchers say.

"We've seen activity in honeypot machines in Asia...They're generating the 50,000 list of (potential) domains to contact," said Paul Ferguson, an advanced threats researcher for Trend Micro.

The latest variant of the worm, Conficker.C, was set to activate on April 1, which for some of the infected machines will happen at local time and for others it will be GMT, depending on whether the machines are turned on and connected to the Internet, he said.

The process seems to be starting slowly, with infected machines starting to generate the list of domains and then picking one domain and trying to contact it and waiting before continuing on through 500 of those 50,000 domains, according to Ferguson.

The owners of the infected computers likely won't notice anything, unless they can't access the Web sites of security vendors and then they will know they are infected, he said. Trend Micro has figured out a way to unblock the computer from the sites that the worm has blocked using a Microsoft networking service, he said. More details are on the Trend Micro site.

"Nothing at this point; we're running updates every half hour or so," Dave Marcus, director of security research for McAfee Avert Labs, said when asked to report what he was seeing. "They're supposed to connect to one of a variety of Web sites and download a piece of code. What that code is supposed to do is up in the air."

more: http://news.cnet.com/8301-1009_3-10208722-83.html
Printer Friendly | Permalink |  | Top
rcrush Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 06:47 PM
Response to Original message
1. My XP Machine is patched up to date I have kaspersky, adaware
and Windows Advanced System Care running on my PC all the time. It does a system scan every morning at 6 am. I use Opera and Firefox and have all the flash ad pop up blocking software as well.


IS THERE ANYTHING ELSE I NEED TO DO?
Printer Friendly | Permalink |  | Top
 
tekisui Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 06:47 PM
Response to Reply #1
2. I have no idea. I hope it is a whole lot of nothing.
Printer Friendly | Permalink |  | Top
 
Kurt_and_Hunter Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 06:48 PM
Response to Reply #1
3. wear a condom when online
Printer Friendly | Permalink |  | Top
 
rcrush Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 06:49 PM
Response to Reply #3
4. I am considering it
:scared: :scared: :scared:
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 06:53 PM
Response to Reply #3
6. ... or live in a condom
inium



:hide:
Printer Friendly | Permalink |  | Top
 
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 06:52 PM
Response to Reply #1
5. Sit back, have a caffeinated beverage, and watch the fireworks.
:nuke:
Printer Friendly | Permalink |  | Top
 
seemunkee Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 07:06 PM
Response to Reply #1
7. A patch that went out in October will prevent infection
See the posting from US CERT below

Conficker Worm Targets Microsoft Windows Systems

Original release date: March 29, 2009
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows


Overview

US-CERT is aware of public reports indicating a widespread
infection of the Conficker worm, which can infect a Microsoft
Windows system from a thumb drive, a network share, or directly
across a network if the host is not patched with MS08-067.


I. Description

The presence of a Conficker infection may be detected if a user is
unable to surf to the following websites:

*
http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm&inid=us_
ghp_link_conficker_worm
* http://www.mcafee.com

If a user is unable to reach either of these websites, a Conficker
infection may be indicated (the most current variant of Conficker
interferes with queries for these sites, preventing a user from
visiting them). If a Conficker infection is suspected, the
infected system should be removed from the network. Major
anti-virus vendors and Microsoft have released several free tools
that can verify the presence of a Conficker infection and remove
the worm. Instructions for manually removing a Conficker infection
from a system have been published by Microsoft in
http://support.microsoft.com/kb/962007.


II. Impact

A remote, unauthenticated attacker could execute arbitrary code on
a vulnerable system.


III. Solution

US-CERT encourages users to prevent a Conficker infection by
ensuring all systems have the MS08-067 patch (part of Security
Update KB958644, which was published by Miscrosoft in October
2008), disabling AutoRun functionality (see
http://www.us-cert.gov/cas/techalerts/TA09-020A.html), and
maintaining up-to-date anti-virus software.


IV. References

* Virus alert about the Win32/Conficker.B worm -
<http://support.microsoft.com/kb/962007>

* Microsoft Security Bulletin MS08-067 - Critical -
<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx>

* Microsoft Windows Does Not Disable AutoRun Properly -
<http://www.us-cert.gov/cas/techalerts/TA09-020A.html>

* MS08-067: Vulnerability in Server service could allow remote code
execution -
<http://support.microsoft.com/kb/958644>

* The Conficker Worm -
<http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm>

* W32/Conficker.worm -
<http://us.mcafee.com/root/campaign.asp?cid=54857>


Printer Friendly | Permalink |  | Top
 
TorchTheWitch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 07:34 PM
Response to Reply #7
10. That patch did NOT work for me
I got the virus last January. Just today I checked to see if I had ever had that patch installed on my computer because I get automatic updates. It WAS installed back in October when it came out, yet I STILL got the virus in January. I don't know what the heck is going on with that patch but it sure didn't do shit for me.

I don't recommend relying on that patch at all.

Printer Friendly | Permalink |  | Top
 
blogslut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 08:50 PM
Response to Reply #10
14. There are three versions of the worm
Have you patched for all three?
Printer Friendly | Permalink |  | Top
 
TorchTheWitch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 08:58 PM
Response to Reply #14
15. I have no clue
The only patch I'm hearing about is the one from October. If there's other patches, Microsoft sure hasn't told me anything about them. Does anyone know about subsequent patches and where to get them and how to check if you DID get them?

Printer Friendly | Permalink |  | Top
 
blogslut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 09:04 PM
Response to Reply #15
16. Here's a helpful page
Printer Friendly | Permalink |  | Top
 
TorchTheWitch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 09:21 PM
Response to Reply #16
17. But this doesn't keep you from getting the other varients
They're just tools to scan your system and kill it if you have it. What is needed is patches from Microsoft that deal with ALL of the varients so you won't get the evil things to begin with. The worm is so prolific you can get infected at any time without a security patch. I already dealt with this nasty booger and cleaned up my computer, but that isn't going to ensure that I won't get it again some time in the future.

Printer Friendly | Permalink |  | Top
 
blogslut Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 09:30 PM
Response to Reply #17
18. I'm sorry
I don't know what to tell you. I have Microsoft Update turned off. As I've said in another thread, I've had one virus in my 14 years on the web and it came from a printer install disk. I do'nt run anti-virus software. Just a firewall and a collection of anti-spyware/malware/browser security programs. I surf with Firefox and I use the NoScript plugin. I never open email attachments. I turn off the preview pane on my email client. I don't save my passwords in password-saving software. If a pop-up or pop-under window gets by me, I close it via keyboard (ctr W).
Printer Friendly | Permalink |  | Top
 
TorchTheWitch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 09:38 PM
Response to Reply #18
19. I don't do any of that stuff either yet I got it
I use Firefox, don't do file sharing, don't open emails if I don't know who it's from, and I use a firewall, virus protection, run several malware and spyware and adware programs, update daily, etc., etc., etc.... yet I got the booger. You can get this monster from ANYWHERE these days. I jsut have no idea why Microsoft put out a patch in October for the first varient and I haven't seen anything since (and the booger got uglier with the next varient... it was most ghastly in January and February which is when I got it despite having that October patch). If there IS such a patch for the subsequent varients, I haven't heard anything about it and can't find anything at Microsoft. Clearly, their October patch isn't working for the subsequent varients.

Thanks for trying to help though.

Printer Friendly | Permalink |  | Top
 
TorchTheWitch Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 07:55 PM
Response to Reply #1
11. Yep, several things
Make sure you have the Windows patch that came out last October (although I got the virus in January WITH that patch, so it didn't do squat for me)...
http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

You can do a free scan from McAfee that will look for the virus and kill it...
http://www.mcafee.com/us/threat_center/conficker.html
(the links to do the scan and kill it if you have it are in the upper righthand corner)

Bunch of other suggestions and info here...
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x5363351

Printer Friendly | Permalink |  | Top
 
SharonAnn Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 10:12 PM
Response to Reply #1
22. Yes. Go to bed and get some sleep.
Printer Friendly | Permalink |  | Top
 
DeepBlueC Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 07:07 PM
Response to Original message
8. just in case ... a countermeasure
Printer Friendly | Permalink |  | Top
 
jazzjunkysue Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 07:10 PM
Response to Original message
9. If you're on Norton and you're updated, you're fine.
So says the Symantec site.

If you can log onto the Symantec site, you're fine, too. It blocks access to the help sites.
Printer Friendly | Permalink |  | Top
 
MiniMe Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 08:24 PM
Response to Original message
12. I manually updated my virus defs today and made sure of the date
of the update. So I think I'm OK. Keeping fingers crossed.
Printer Friendly | Permalink |  | Top
 
NYC_SKP Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 08:46 PM
Response to Original message
13. Virus, Schmirus......Bring 'em on. I hope you all don't catch it, I know I won't.


:hi:
Printer Friendly | Permalink |  | Top
 
cliffordu Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 09:52 PM
Response to Original message
20. Man I just LOVE the LINUX!!!!
Printer Friendly | Permalink |  | Top
 
MazeRat7 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-31-09 10:07 PM
Response to Original message
21. Shut down all outbound traffic via your firewall....
We have many systems of various OS types here at the home. Two of them happen to be of the Windows variety. Yes they have updated virus defs, yes I am fairly confident they are secure, but you know what...for the next 24-48 hours, those two systems will not be able to communicate outside my home network. Furthermore, I have turned on a network analyzer (Wireshark in my case) just to collect stats in the off chance I missed something.

All this took about 10 min of my time. No worries here.

Peace,
MZr7
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 23rd 2024, 10:27 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC