April 1 Virus

MrBishop

Well-Known Member
COnf@cker hits with a whimper, not a bang
The Conficker worm today has begun to phone home for instructions but has done little else. Conficker was programmed to today begin actively visiting 500 out of 50,000 randomly generated web addresses to receive new instructions on how to behave. Conficker has begun to do this, according to security company F-Secure, but so far no doomsday scenarios have emerged.

Among security experts, the consensus seems to be that very little will happen today. This may be in part because of the high amount of publicity Conficker has received, but then again April 1 is not the first time Conficker has been programmed to change the way it operates. Similar trigger dates have already passed with little change, including January 1, according to according to Phil Porras, a program director with SRI International. Security experts at Symantec, the maker of Norton Antivirus, also believe the threat is overblown and says Conficker today will "start taking more steps to protect itself" and "use a communications system that is more difficult for security researchers to interrupt."

Technology companies and experts across the globe have been working together to halt the spread of Conficker, disrupt its communications and uncover who created the worm. Microsoft has even issued a $250,000 bounty for information leading to the arrest and conviction of Conficker's authors. Despite the security sector's best efforts, very little is known about the origins of Conficker or its purpose. Nevertheless, some breakthroughs have been achieved. On March 30, Security experts with the Honeynet Project discovered a flaw in Conficker that makes it much easier to detect infection. IBM researcher Mark Yayson also believes he has discovered a way to "detect and interrupt the program's activities," according to The New York Times.

Since the Conficker worm was discovered in October 2008, the malware has only received programming updates from its author and worked to infect other computers. Conficker is believed to have infected 10 million computers worldwide mostly in Asia, Europe and South America. According to IBM, only 6 percent of North American computers have been infected.
Still slowed my company down for few hours, eh
 

catocom

Well-Known Member
at firewall, that monitors applications accessing the internet.

I use an old sygate firewall.


They say try to go to MS, mcafee, or norton sym.
It doesn't want you to go there, but it's my understanding AV updated will find it.
 

Mirlyn

Well-Known Member
got 2 weeks more to be sure, to go through all the way, at least.
Longer, I'd wager. I believe the last conficker "doomsday" was Jan 1. The latest code said April 1. Now they think this round will start up again in May (thus giving researchers a much much larger pool of suspected domains to sort through to look for sources).
So is there anything to tell if your computer is infected?
http://www.microsoft.com/downloads/...E0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
 

Professur

Well-Known Member
Is anyone else thinking what I'm thinking? That this is an artful misdirection aimed solely at getting people to pay up for their antivirus subscriptions?
 

Mirlyn

Well-Known Member
Is anyone else thinking what I'm thinking? That this is an artful misdirection aimed solely at getting people to pay up for their antivirus subscriptions?
Wouldn't make sense this time. They wouldn't block themselves--that's how many purchase/renew their subscriptions.

This is just a way to get the biggest botnet out there and then sell out. This isn't the first, and surely won't be the last.
 

Luis G

<i><b>Problemator</b></i>
Staff member
The best way to be safe is to disable unused services. I for instance haven't patched my winxp because I have server service disabled. If it isn't running it can't be exploited.
 
Top