New, Stealthy Conficker B++ Worm Discovered 87
nandemoari writes "A new variant of the Conficker/Downadup worm has been detected. The worm opens a backdoor on an infected machine and allows hackers remote control of infected PCs.
Dubbed Conficker B++ (and not to be confused with Conficker B), the new variant of the worm opens a backdoor with auto-update functionality, allowing a hacker to distribute malware to infected machines.
It's difficult to know exactly how long Conficker B++ has been circulating, but researchers first noticed it on February 6 of this year." If this seems familiar to you, it probably is.
Why only B? (Score:2)
Re: (Score:2)
Re:Why only B? (Score:4, Funny)
Then he can sell it on eBay as A++++++++++++++
Windows Update... (Score:1)
Re: (Score:2)
Just a few, but there are a number of issues wi
Re: (Score:1)
Re: (Score:1)
Detection (Score:3, Interesting)
Re: (Score:1)
profit motive (Score:2)
I'm assuming there's some sort of profit motive behind all this virus writing... is it to generate crappy run-of-network traffic for ad revenue? Identity theft? Extorting money from online businesses by threatening to turn your bot network on them? What?
Re:profit motive (Score:5, Funny)
Sell anti-virus software.
Re:profit motive (Score:5, Interesting)
You laugh, but that situation is just what F-Secure describes [f-secure.com] for an unrelated bit of Facebook malware [f-secure.com]. FTFA:
Re: (Score:2)
Scamers and phishers need anonymate also, a botnet can provide this.
There is also the very possible old-fashion extortion, mafia style.
Re:profit motive (Score:5, Insightful)
Botnets can be profitable, however, someone skilled enough to write the malware necessary for botnet creation could likely be making better money in the private sector with a real job and no jail risk (in the US, at least). Most of the stuff I see comes from Eastern Europe or Asia, where law enforcement is unlikely to prosecute and there aren't decent Software industries hiring people with programming talent.
So they make money by
Re: (Score:1)
DDoS extortion (yes, european banks have paid botnet owners' extortion demands to avoid getting DoSd.)
You'd think large banks would be more able to "follow the money" better than most victims and swing the clout to do something about it once they have.
Re: (Score:2)
[citation needed]
Re: (Score:3, Interesting)
That's not necessarily true - I mean the skills required to exploit a known security hole aren't terribly difficult.
If you're familiar with a small amount of low-level coding you can easily follow cookbook-style tutorials to getting shellcode executed. At that point you're done.
Sure you need to do some disguising, and you need to understand a bit of crypto to setup a key-verification for downloading updates.
But I'd expect there are literally millions of coders still kicking around from the 80s/90s who did
Re: (Score:2)
I disagree with you.
Point 1: Building and managing a botnet is not just "exploit[ing] a known security hole."
Point 2: Your statement that computer programming is not "skilled work" is just bizarre.
Point 3: Your statement that a "significant proportion" of "millions of coders" are unemployed isn't backed up by any evidence I've seen. Unemployment is high right now, but not among programmers.
Re: (Score:1)
A botnet starts off with one machine, scanning the world for more vulnerable hosts and exploiting them in turn. Sure you'd do better if you were to have a few hundred to start with - but building a botnet, assuming you can create an exploit is almost trivial.
I wasn't suggesting that computer programming is unskilled, merely that there are no real special skills required to exploit a security hole - which is what you were trying to imply.
(i.e. Botnet writers are not so amazingly skilled that they would be s
Re: (Score:2)
Have you actually studied botnets? Especially modern ones like conficker? To build one, you need to get an exploit working, you need to write the virus component so that it spreads, and you need to write the server (bot) component. You must also include some tricks to disable security software, and perhaps implement a code obfuscation process which can't be easily reverse-engineered. On top of all that, you MUST have a sophisticated method for controlling the botnet that is highly scalable, extremely diffic
Re: (Score:1)
Yes I've studied them, partly because i used to code exploits in the past, and partly out of curiosity.
I did say initially there are parts to them that require knowledge. The authentication steps to ensure the owner keeps control, and the rootkit components to hide them once installed would probably be the most challenging aspects of the net.
But none of the pieces are individually hard to code (I've written several of them myself) and while a junior/entry-level programmer might struggle I'm not convinced
Re: (Score:2)
There is a difference between writing "a few" botnets, and writing one that actually works. Yours didn't work. You didn't have a control channel sophisticated enough to scale and avoid standard security controls.
Re: (Score:1)
You misunderstand me - I didn't mean to say I've created and released botnets into the wild.
I meant that with private networks I've created self-replicating code which actively scanned and infected new hosts and had a sophisticated control mechanism which allowed control, updates, and activities.
Still I've either convinced you that writing a bot, and by extension creating a botnet, is not exceptionally difficult - or I haven't.
Re: (Score:2)
But I'd expect there are literally millions of coders still kicking around from the 80s/90s who did assembly programming under MS-DOS who would be able to write that kind of code - and because it isn't really really skilled work the chances are high that a significant proportion of those developers are unemployed.
That's right. I cut my teeth on x86 ASM cracking warez and writing virii. Programming never really grabbed my attention though. All things considered it was much too dry and structured. I didn
Re: (Score:1)
This is just a passing virus (Score:5, Funny)
No need to worry. I'd be more worried about Conficker C. Lots of opportunities to shoot you in the foot.
Then someone will undoubtedly create Conficker C++ and everyone will cry about how hard it is to understand and they will all flock to Conficker Java which promises a much cleaner object system.
But eventually you know that some idiot is going to write Conficker C# which looks suspiciously like Conficker Java, but after a while grows into this gigantic mess of quickfix designs.
So if you think Conficker B is bad, just wait a while.
Re: (Score:1)
Re: (Score:2)
How to detect Conficker C# (Score:5, Funny)
The only way to detect Conficker C# is that it requires the .NET runtime environment and MS SQL Server Express.
Re: (Score:2)
And once again mono prevalence increases due to viruses. Just like the good old days!
Re: (Score:1)
That does it. Windows users have all the fun. This is just another sign that Linux will never, ever gain widespread acceptance. And that fabled Year of the Linux Desktop? Keep dreaming guys. I'm dumping Bubuntu Linux XP and moving to Windows. See you around suckers.
Re: (Score:1)
What are you talking about? Its in the .NET 3.5 Installer!
Why do you think the full-package installer of 3.5 needs an internet connection to download more? Conspiracy!
Functional malware (Score:1)
Re: (Score:2)
Forth Conficker powerful very is to used getting some takes but.
Cornfucker national anthem... (Score:1, Funny)
*ahem* [taps microphone, clears throat again] *ahem*
And a five, six, seven, eight:
"Botnets, worldwide botnets.
What kind of boxes are on botnets?
Compaq, HP, Dell and Sony, TRUE!
Gateway, Packard Bell, maybe even Asus, too.
Are boxes, found on botnets.
All running Windows, FOO [fu]!"
=Smidge=
Armour Hot Dogs? (Score:3, Funny)
Seems to go with the Armour Hot Dog song. Was that the intent?
Old news? (Score:1)
Is it just me or has /. been reading like yesterday's news lately?
Re: (Score:1)
That might be because it takes so long for stories to get approved...
Re:Old news? (Score:4, Insightful)
News for nerds, stuff that matter[ed yesterday]!
On another note, if the editor knew of the previous story.. why was it posted? I must admit, I'm not very knowledgeable on the editorial process of ./
Re: (Score:3, Funny)
Don't worry, the editors don't either.
Re:Old news? (Score:4, Funny)
You heard about the infinite amount of monkey's? (Score:2)
A bit like having an infinite amount of monkey's writing shakespear. Sadly they could only aford half a dozen monkey's but what they lack in numbers they make up for in poop slinging skills.
Re: (Score:1)
I'm not very knowledgeable on the editorial process of ./
Neither am I. Come to think of it, this is the first I've heard of the "editorial process of the current working directory." I ought to go googling later....
Or is there some other dot-slash that's relevant to this story?
Re: (Score:2)
Nicely spotted
Re: (Score:2)
Meh, I would not have seen it if it wasn't posted today. Who cares about a few duplicates every once in a while. You get a fresh update and maybe some new people talking about it.
But can it.... (Score:4, Funny)
cause five tankers in the Ellingson fleet to capsize?
Re: (Score:1)
Re: (Score:2)
-"Is that -?"
"-That is mr. conflicker B++"
-"Well then, put our servers under Linux control"
"There's no such thing anymore, Duke. These computers are fully DRMised. It relies on satalite internet, which links our servers to Redmond"
I can't seem to get a Linux copy of this worm (Score:1, Funny)
Re: (Score:1)
I am feeling very left out, I can't seem to find Conficker B++ or even Conficker B in my yum repository. sigh... It is such a shame that linux is always behind the curve as far as new and exciting features are concerned.
'Coz the distro maintainers refused to include non-opensource binary blob in their repo.
Make yourself heard. Chances are the malware author is considering opensourcing it too but no one's asking for it so far.
Re: (Score:1)
Just install Wine and run it through that. /problem>
Confusion (Score:2)
Conflicker B++ should not be confused with Objective Conflicker B. Fortunately, they can easily be distinguished from one another - Objective Conflicker B has many more square brackets.
Who is at risk? (Score:2, Informative)
Let's turn this blog positive.
What current anti-virus solution detects and removes this new variant ?,
Who is it risk?, people with updated anti virus solutions? or just people who don't use and update them?
Are people with Linux and OS-X at risk also ? What is the scope of it?
If Linux and OS-x are not threatened This might be another reason Not to use Windows ?
The answers to these will help people determine just how big a threat or not this new variant might be, and help them
Re: (Score:3, Informative)
Re: (Score:2)
The patch stops the SMB vulnerability, but I believe the USB auto-run is just an executable. There's no vulnerability needed if the OS is going to run the autorun a file as administrator.
MS should just globally disable autorun. This is getting out of hand. Half of these infections is probably some low-paid tech inserting the same usb drive into his customers computers. That seriously would not surprise me.
so if I understand this correctly .... (Score:3, Interesting)
I clearly must not understand the intricacies of this....
My fantasy (because I won't be affected by this) is that once the owners of the botnet are sufficiently happy with their market-share, will instruct cornfucker to encrypt all files on everyone's PC and then wait for the moneh to start rolling in....
Proper naming convention, please (Score:3, Interesting)
And what kind of scheme? Well, how about following the convention of the hurricane trackers? 26 names assigned to each major piece of malware that appears throughout the year. This is a double bonus, as ending the practice of using the authors' chosen names might take away some of that bragging aspect. "Oh, you wrote Malware Julie did you?? Bwahaha"
Re: (Score:2)
Conficker/Downadup? B? B++? Is it time we had a proper naming scheme for these things?
You forgot Net-Worm.Win32.Kido.bt
Well, how about following the convention of the hurricane trackers? 26 names assigned to each major piece of malware that appears throughout the year.
Malware writers might get sloppy as they vie for the top names, trying to make sure that _their_ malware becomes a headline in just the right time to be named "Thor" or "Linus".
When Change comes to viruses (Score:2, Funny)
I'd like to see an incredibly stealthy virus - one that stays out of the way to the point that it isn't detected for some number of years.
Have it patch key parts of the Windows kernel to degrade performance in subtle but believable ways...
Lobotomize the scheduler so that context switches occur much less often than they should for responsiveness.
Kick up the swappiness from Ridiculous (stock setting) to We've-gone-plaid
Divide the given buffer length for each I/O operation so that CPU usage goes up and through
Re: (Score:3, Funny)
You just described Vista ...