Conficker Worm Finally Begins Attacking PCs

Friday, April 24, 2009

BOSTON —  A malicious software program known as Conficker that many feared would wreak havoc on April 1 is slowly being activated, weeks after being dismissed as a false alarm, security experts said.

Conficker, also known as Downadup or Kido, is quietly turning thousands of personal computers into servers of e-mail spam and installing spyware, they said.

The worm started spreading late last year, infecting millions of computers and turning them into "slaves" that respond to commands sent from a remote server that effectively controls an army of computers known as a botnet.

• Click here to read how to protect yourself from the Conficker worm.

• Click here for Microsoft's solution.

• Click here to visit FOXNews.com's Cybersecurity Center.

• Got tech questions? Ask our experts at FoxNews.com's Tech Q&A.

Its unidentified creators started using those machines for criminal purposes in recent weeks by loading more malicious software onto a small percentage of computers under their control, said Vincent Weafer, a vice president with Symantec Security Response, the research arm of the world's largest security software maker, Symantec Corp.

He said that while he believes the number of infected machines that have become active is relatively small, he expects a consistent stream of attacks to follow, with other types of malware distributed by Conficker's authors.

"Expect this to be long-term, slowly changing," Weafer said of the worm. "It's not going to be fast, aggressive."

Conficker installs a second virus, known as Waledac, that sends out e-mail spam without knowledge of the PC's owner, along with a fake anti-spyware program, Weafer said.

Related Stories

The Waledac virus recruits the PCs into a second botnet that has existed for several years and specializes in distributing e-mail spam.

Conficker also carries a third virus that warns users their PCs are infected and offers them a fake anti-virus program, Spyware Protect 2009 for $49.95, according to Russian-based security researcher Kaspersky Lab.

If they buy it, their credit card information is stolen and the virus downloads even more malicious software.

"This is probably one of the most sophisticated botnets on the planet. The guys behind this are very professional. They absolutely know what they are doing," said Paul Ferguson, a senior researcher with Trend Micro Inc, the world's third-largest security software maker.

He said Conficker's authors likely installed a spam engine and another malicious software program on tens of thousands of computers since April 7.

He said the worm will stop distributing the software on infected PCs on May 3 but more attacks will likely follow.

"We expect to see a different component or a whole new twist to the way this botnet does business," said Ferguson, a member of The Conficker Working Group, an international alliance of companies fighting the worm.

Researchers had feared the network controlled by the Conficker worm might be deployed on April 1 since the worm surfaced last year because it was programed to increase communication attempts from that date.

The security industry formed the task force to fight the worm, bringing widespread attention that experts said probably scared off the criminals who command the slave computers.

The task force initially thwarted the worm using the Internet's traffic control system to block access to servers that control the slave computers.

Viruses that turn PCs into slaves exploit weaknesses in Microsoft's Windows operating system. The Conficker worm is especially tricky because it can evade corporate firewalls by passing from an infected machine onto a USB memory stick, then onto another PC.

The Conficker botnet is one of many such networks controlled by syndicates that authorities believe are based in eastern Europe, Southeast Asia, China and Latin America.


FOX NEWS VIDEOS



ADVERTISEMENT

most active


ADVERTISEMENT

HOW GREEN?

  • 'Green' Bug Spray

    There's plenty of insecticides to choose for your garden -- but which are both effective and safe?
  • Pocketful of Pleasure

    Tech Tuesday: Pocket projectors are the new geek toy -- but can they catch on in the wider world? | PHOTOS

ONLY ON FOX

  • Spam King?

    Former senator Bill Bradley may be helping to clog up your inbox with unwanted e-mail
  • Cloner's Ark

    Ten noteworthy 'firsts' among cloned animals, plus one strange mouse that's got two mommies | PHOTOS
  • Avast, Ye Scalawags!

    Ten high-tech weapons ships' crews could use to fend off pirates | PHOTOS
  • Gadget Graveyard

    Ten technologies about to go extinct, including a couple you may be surprised by | PHOTOS
  • Previewing the Pre

    FOX Fast Forward: Believe the hype: Palm's got a winner on its hands with its new smartphone | PHOTOS
  • NASA by the Numbers

    Huge cost overruns plague some of space agency's key projects
  • NASA's Secret Rebels

    Engineers anonymously working on 'cheaper, safer' moon rocket want Obama on their side | PHOTOS
  • Take Me to Your Leader

    Eighty days into Obama presidency, NASA is still waiting for White House to name administrator
  • Collision Course

    Scientists race to prevent 'catastrophic disaster' from space junk in orbit | PHOTOS
  • Quantum Leap Forward

    Review: Nintendo's new DSi console adds apps, functions to become plenty of fun even without games