Microsoft Warns of Copycat Conficker Worm 86
nk497 writes "Microsoft is warning that malware writers have adapted a four-year-old virus to use features of Conficker to take advantage of Windows flaws. Other similarities between the adapted Neeris worm and Conficker are that it downloads a copy of the worm from the attacking machine using HTTP, spreads via autorun, and uses a driver to patch the TCP/IP layer of the system. It even saw a traffic jump around the first of April, when the Conficker hype peaked. But the Microsoft researchers suggested Conficker may have copied Neeris, or that they're copying each other: 'It is possible that these miscreants somehow collaborate or at least are aware of each other's "products."'"
Re: (Score:1)
but not... the SYMPTOM!
</frank-n-furter>
Uh oh (Score:5, Insightful)
This is could one of two ways, either the viruses will try and outdo each other by doing more and more outrageous things to the victim's computer or (and let's face it, this would be more amusing) they'll try and kill each other to get sole ownership of the PC.
Either way, I'm glad I use Linux.
Re: (Score:1)
http://xkcd.com/350/ [xkcd.com]
Re: (Score:3, Interesting)
Re: (Score:2)
Either way, I'm glad I use Linux.
So am I because you can't pass it on to others.
Re: (Score:2)
Sure you can, freely and legally.
Re: (Score:3, Funny)
he viruses will try and outdo each other by doing more and more outrageous things to the victim's computer
I miss the virus's of the 90's that would randomly open and close your CD tray. They should bring that back. Slightly amusing and didn't steal personal data.
Re: (Score:2)
Hell yes! BackOrifice ftw. I used to pop the CD drive on a friend's machine (remotely), put up a msgbox saying "Feed me bologna!". Since you could detect the drive being closed, I would just repeat as necessary.
Re: (Score:2)
http://angryflower.com/bobsqu.gif [angryflower.com]
Re: (Score:1)
http://xkcd.com/386/ [xkcd.com]
autorunamuk (Score:2, Funny)
when will they ever get rid of that?
Re: (Score:2, Informative)
It's pretty rare on Windows to actually need to reboot for software installation. The only things you can't really do are replace or delete files that are in use, and remove / replace a driver without rebooting.
The real secret - it hasn't really ever been necessary. Almost everything you'd want to do in an application installer could be done without rebooting even on Windows 95. Only system-level software (drivers, for example) ever really needed a reboot, and even that never really needed it on Windows NT.
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Informative)
No, they are updating an old virus to use the new flaws. Think about it. If the old virus used the same security holes as Conficker then it would not need to be updated.
Re:Four years? (Score:4, Insightful)
Conficker only affects out-of-date systems made vulnerable by idiots turning off security systems to gain a small performance improvement.
But hey, don't let me interrupt your "Bash M$; get karma" rant...
Re: (Score:3, Interesting)
This is untrue. Conficker uses a variety of ways to spread itself. Such as installing itself as autorun on various volumes. It also includes a password attack to get admin access to a machine and infect SMB shares.
It may use additional methods as well. This is part of the reason conficker is getting so much press.
Re: (Score:2)
Re: (Score:2)
> It also includes a password attack to get admin access to a machine
RT virus scans and patches won't save you from that.
Re: (Score:2)
Re: (Score:2)
Except they really do not. The *next* generation is *supposed* to do behaviour monitoring instead of definition files, but the current generation does not.
Also, conficker disables most AV Scanners, making the point moot.
Re: (Score:2)
Except they really do not. The *next* generation is *supposed* to do behaviour monitoring instead of definition files, but the current generation does not.
No "behaviour monitoring" is necesary if the scanner recognises the code being exectued is a virus. And most modern scanners do have behaviour monitoring in the form of intelligent heuristics that can (sometimes) detect threats that aren't defined in a virus definition file.
Also, conficker disables most AV Scanners, making the point moot.
Only if it's allowed to execute, which it shouldn't be if a good real-time scanner with an up-to-date DAT file is present on the system.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
It's like stealing a plant from a store, refusing to water it, then when it dies you get mad at the store that you stole it from. Tough balls.
Re: (Score:1)
Re: (Score:2)
Look, if you're running an illegitimate copy of Windows, and you have problems with it, tough. (If you're running a legit copy that WGA thinks is illegitimate, complain to Microsoft. Or make a voodoo doll of Steve Balmer, and put it in front of Gilligan's Island reruns. Or whatever. It isn't really my problem, except if it happens to me when I boot up Windows to play a game.)
My objection is that anybody running an unpatched copy of Windows makes my life more difficult. If people would figure out som
Re: (Score:2)
I understand your argument, but couldn't one conversely blame Microsoft? After all, if they didn't expressly prevent these machines from getting updates, this wouldn't be as big of a problem.
Shocking... (Score:5, Insightful)
Seriously, though. It would be more of a surprise if they weren't doing this. Of course players in a competitive market are going to be watching each other and adopting each others best features.
Worms copying each other (Score:4, Interesting)
How long before each worm includes a copy of its source code in a git repository, searches out other variants of the same worm on the infected system or across the net, and randomly exchanges patches with them to create hybrid offspring? The worm would need some way to compile itself, of course (unless written in Javascript or other scripting language where the interpreter is included with Windows).
Re: (Score:1)
because the strain would have to be identifiable. this means greater detection by virus scanners and the possibility of being exploited by rogue creations.
the authors more than likely have a code repository on their systems that they share with each other. hell, search hard enough and you can find this code shared on their personal websites. the innovative authors take pieces of code from others and re-release the source. another favorite is decompiling code from an author who chooses not to help others
Re: (Score:1)
How long before each worm compares copies of other source code, checks it for copyright and patent infringement, and automatically fires off legal threats?
Re: (Score:2)
Re: (Score:1)
A way of getting around this would be to code your virus in a self-modifying assembled object. Ah, there's hope for us old Real Programmers [pbm.com] yet. Just when you kiddies thought we were all getting a bit smelly...
Miscreants! (Score:5, Funny)
Why, I very nearly dropped my monocle when I heard that the rascals might be cahoots! Perhaps they have some sort of network (a system of tubes, perhaps?) that allows them to share their diabolical plans! Fiendishly clever!
We must safeguard our computing engines! I say we must find these these rogues and hang them from the highest scaffold in the land!
Copyright...? (Score:2)
What to say? (Score:2)
Considering Conficker has been all over the news and the maker of Neeris would have to be working in a cave beside Osama not to have seen anything about it, I dare say it is more than freakin' likely they know of each others products.
Now if only Microsoft knew as much about Window
Microsoft wants you to have the genuine worm (Score:5, Funny)
They will shortly be releasing a tool to test your system to make sure you have the real worm and not some impostor/pirate copy of the worm. This will be an extension of the WGA program.
The new Windows Replica Advantage (WRA) program (Score:2)
Of course! They're connected to teh intertubes (Score:5, Interesting)
"It is possible that these miscreants somehow collaborate or at least are aware of each other's 'products.'"
Well, no shit, Sherlock. Guess they must have Internet connection too, then...
With all the resources at Microsoft's disposal, you'd have thought that they'd have come up with a specific fix. Yes, I'm aware that regularly-patched machines are better protected, but the evidence is clear that many people don't do that; (and not just the pirates, either).
If Ms supplied something that detected/removed/protected against up&down, (free, with no 'Genuine Advantage / Validation' bs), then I'm sure pretty soon all the media would link to that & the sheeple would rush to download & install... How about it, Redmond?
Re:Of course! They're connected to teh intertubes (Score:5, Insightful)
Disagree. Windows security issues are a major concern for Microsoft's customers, and hence to them. Apple, BSD/*x and FOSS boosters, (and yes, I'm one) regularly point out how much more 'secure' their platforms are. (Of course, as debated endlessly here and elsewhere, that may be as much a function of market share as inherent design, although few informed people would seriously challenge the latter).
Of course, it's not just the OS, it's the apps. Ms makes a lot from selling 'Office' too, which has its own vulnerabilities.
So, since the competition is 'free' (*x & Ooo) and more secure, yes, I guess they do give a damn.
Re: (Score:3, Interesting)
I disagree with that statement. IMHO, Windows users are either:
1. Concerned about viruses, but they think their machine has some magical immunity because they don't actually think their machine might ever be infected, OR:
2. Are totally clueless about viruses and spyware.
Even on forums where experienced users post, how many times have you seen a post that is something like: "I don't use anti-virus, I'm j
Re: (Score:1)
I hope you're not trying to imply that it's impossible to be safe on Windows without anti-virus. Being careful about where you browse is stupid, as any site can get hacked to spread malware.
Using common sense, like not blindly opening attachments, being behind a NAT router and/or firewall and using a web browser that isn't IE that gets updated regularly goes a long way towards being malware-free. You can go even further and implement a whitelist for programs (instead of the anti-virus blacklist, which is on
Re: (Score:2)
The funny thing is that its nearly impossible to prove the negative of "they just haven't been aware of the infection on their machine!" Your Linux box has a secret virus that only a few people know about, and has managed to hide itself so well you don't even realize you have it! Prove I'm wrong. How are you going to do that? I suppose you could run anti-virus, at which point I could say that your anti-virus just doesn't know about it. You could do checksums, until I say that it uses a weakness in the
Re: (Score:2)
(Of course, as debated endlessly here and elsewhere, that may be as much a function of market share as inherent design, although few informed people would seriously challenge the latter).
Which part of the "inherent design" of Windows makes it less secure ?
Re: (Score:2)
They only give a damn about security issues that are public. Unknown ones they just sit on, as has been demonstrated several times with vulnerabilities like the Windows meta file one.
Re: (Score:2)
Re: (Score:2)
If Ms supplied something that detected/removed/protected against up&down, (free, with no 'Genuine Advantage / Validation' bs), then I'm sure pretty soon all the media would link to that & the sheeple would rush to download & install... How about it, Redmond?
The virus does it's best to block attempts at removal as you'd expect, but still, you seem to be referring to something along these lines [microsoft.com] with specific instructions on detection and removal from M$, or perhaps even the Windows Live safety scanner, which despite it's crappy sounding name apparently detects and removes it.
/. and bashing the evil corporation usually results in "sheeple" modding you up, but did you really think M$ wouldn't have thought about supplying people with the means
Yes I know this is
Re: (Score:2)
Thanks, I was actually aware of all that stuff.
Now I invite you to navigate to the page you linked to - where's the big red button marked 'Worried newbie? Click here to download/do online scan now'.
Links to that button should be all over the net.
They're not. Why?
Re: (Score:1)
You see stories all over the press about "this accident". You don't hear about the people that cleaned it up. "The internet in X places went down yesterday" - no followup of "The internet is back for those that suffered".
Re: (Score:2)
Because the media are just as bigoted as you in hating Microsoft
Don't hate Ms - check my posting history. Still think they could do a lot more on security, tho'.
Re: (Score:2)
Thanks, I was actually aware of all that stuff.
Oh, sorry, I must have misunderstood when you wrote "you'd have thought that they'd have come up with a specific fix", and it was utterly stupid of me to link to a page with a specific fix.
Now I invite you to navigate to the page you linked to - where's the big red button marked 'Worried newbie? Click here to download/do online scan now'.
For those unable to read, comprehend and follow instructions there are two big blue buttons that say "Get help now". Sorry they're not red.
Links to that button should be all over the net. They're not. Why?
Put "remove conficker" into Google and you're about three clicks away from a number of downloadable removal tools. Sorry, but anyone that can't be bothered to read a little and wants a
Re: (Score:2)
With all the resources at Microsoft's disposal, you'd have thought that they'd have come up with a specific fix. Yes, I'm aware that regularly-patched machines are better protected, but the evidence is clear that many people don't do that; (and not just the pirates, either).
How about if Microsoft would mod the "malicious software removal tool" to patch only the vulnerabilities that any removed malware exploited?
Re: (Score:2)
sed 's/2b: unpatched/2b: unexploited/'
Me and my mad previewz skillz.
Err Morro??? (Score:1)
http://www.pcworld.com/businesscenter/article/154146/microsoft_drops_onecare_antivirus_product.html [pcworld.com]
That being said, there will probably still be the Genuine Disadvantage stuff.
Re: (Score:1)
Re: (Score:2)
If Ms supplied something that detected/removed/protected against up&down, (free, with no 'Genuine Advantage / Validation' bs), then I'm sure pretty soon all the media would link to that & the sheeple would rush to download & install... How about it, Redmond?
They do.
Malicious Software Removal Tool [microsoft.com]
Download Link [microsoft.com]
Technical Details [microsoft.com]
You'll note said tool does not require any validation to download, anyone can download it regardless of the legality of their copy of Windows; no validation or genuine advantage required, period.
This tool is also regularly distributed via Automatic Updates/Windows Updates to help clean out any infections that computers that use these services may have contracted, either because they weren't patched, or some other mechanism tha
MAD Magazine (Score:1, Offtopic)
Idiots guide to detecting Conficker (Score:5, Informative)
This tickled my funny bone for some reason; you have to love the lets-use-pictures approach!
Grammar Nazi (Score:1)