{"id":70458,"date":"2014-07-07T19:29:33","date_gmt":"2014-07-07T23:29:33","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-25T20:48:52","modified_gmt":"2021-08-26T00:48:52","slug":"conficker-worm-still-alive","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/conficker-worm-still-alive\/","title":{"rendered":"Conficker Worm &#8211; Still Alive"},"content":{"rendered":"<address><a href=\"https:\/\/web.archive.org\/web\/20140502214531\/http:\/\/blog.lib.umn.edu:80\/meriw007\/myblog\/2012\/03\/clean-the-dirty-pot.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-107252\" title=\"Conficker Worm - Still Alive\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Confused_guy-1.jpg?resize=69%2C100&#038;ssl=1\" alt=\"Conficker Worm - Still Alive\" width=\"69\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Confused_guy-1.jpg?resize=103%2C150&amp;ssl=1 103w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Confused_guy-1.jpg?resize=52%2C75&amp;ssl=1 52w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Confused_guy-1.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 69px) 100vw, 69px\" \/><\/a><em>After 6 years <strong><a title=\"Conficker\" href=\"https:\/\/web.archive.org\/web\/20140911074112\/http:\/\/about-threats.trendmicro.com:80\/us\/malware\/CONFICKER\" target=\"_blank\" rel=\"noopener noreferrer\">Conficker<\/a><\/strong> remains one of the <strong><a title=\"Threats\" href=\"http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt-cybercrime-hits-the-unexpected.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">top 3 malware<\/a><\/strong> that affects enterprises and small and medium businesses <a title=\" Jul1 DOWNAD Tops Malware Spam Source in Q2 2014\" href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/downad-tops-malware-spam-source-in-q2-2014\/\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to <a title=\"TrendMicro\" href=\"http:\/\/www.trendmicro.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro&#8217;s<\/a> (<a title=\"NASDAQ : TMICY\" href=\"https:\/\/www.tradingview.com\/symbols\/OTC-TMICY\/\" target=\"_blank\" rel=\"noopener noreferrer\">TMICY<\/a>)<\/em> <a title=\"TrendLab\" href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/\" target=\"_blank\" rel=\"noopener noreferrer\">TrendLab<\/a>. <em>They say 45% of malware-related spam emails they detected were related to Conficker. Trend Micro attributes this to the fact that a number of companies are still using <\/em><em><a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft&#8217;s<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"Windows XP\" href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/help\/what-does-end-of-support-mean\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Windows XP<\/a>, which is susceptible to this threat.<\/em><\/address>\n<h3><em>6 years old <\/em><a href=\"http:\/\/www.slate.com\/articles\/technology\/technology\/2009\/03\/the_worm_that_ate_the_web.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107254\" title=\"Conficker\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/conficker_worm.jpg?resize=76%2C100&#038;ssl=1\" alt=\"Conficker\" width=\"76\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/conficker_worm.jpg?resize=114%2C150&amp;ssl=1 114w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/conficker_worm.jpg?resize=57%2C75&amp;ssl=1 57w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/conficker_worm.jpg?w=252&amp;ssl=1 252w\" sizes=\"auto, (max-width: 76px) 100vw, 76px\" \/><\/a><\/h3>\n<p>For those that don&#8217;t remember our old friend Conficker (Trend calls it <a title=\"Conficker\" href=\"https:\/\/web.archive.org\/web\/20140910191703\/http:\/\/about-threats.trendmicro.com:80\/us\/webattack\/69\/confickerdownad%20once%20at%20the%20forefront%20now%20blends%20into%20the%20background\" target=\"_blank\" rel=\"noopener noreferrer\">DOWNAD<\/a>) it can infect an entire network via a <strong>malicious URL, spam email, and removable drives<\/strong>. <a href=\"https:\/\/web.archive.org\/web\/20220224222733\/https:\/\/www.zdnet.com\/meet-the-team\/us\/larry-seltzer\/\" target=\"_blank\" rel=\"noopener noreferrer\">Larry Seltzer<\/a> at <a title=\"ZDnet\" href=\"http:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet&#8217;s<\/a> <a title=\"Zero Day log\" href=\"http:\/\/www.zdnet.com\/blog\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Day<\/a> blog <a title=\"Conficker: Still spamming after all these years\" href=\"https:\/\/web.archive.org\/web\/20141201113551\/http:\/\/www.zdnet.com:80\/conficker-still-spamming-after-all-these-years-7000031206\/\" target=\"_blank\" rel=\"noopener noreferrer\">recalls<\/a> that Conficker was a big deal back in late 2008 and early 2009. The base\u00a0vulnerability caused <strong>Microsoft<\/strong> to release an <strong>out-of-band update<\/strong> (<a title=\"MS08-067 - Vulnerability in Server Service Could Allow Remote Code Execution\" href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms08-067.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MS08-067 &#8220;Vulnerability in Server Service Could Allow Remote Code Execution&#8221;<\/a>) in October <strong>2008<\/strong>. In addition, <a title=\"Conficker\" href=\"https:\/\/en.wikipedia.org\/wiki\/Conficker#Payload_propagation\" target=\"_blank\" rel=\"noopener noreferrer\">Conficker<\/a> has its own <a title=\"Domain Generation Algorithm\" href=\"http:\/\/en.wikipedia.org\/wiki\/Domain_Generation_Algorithm\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">domain generation algorithm<\/a> that allows it to create randomly generated URLs.\u00a0 It then connects to these created URLs to download files on the system.<\/p>\n<p>Technically, Windows Vista and the beta of Windows 7, were vulnerable, but their <strong>default firewall configuration<\/strong>\u00a0mitigated the threat. It was Windows XP that was really in danger. Mr. Seltzer says that despite Microsoft&#8217;s patch, everyone knew that a major worm event was coming. When it came it was big enough that a special industry group (<a title=\"Conficker Working Group\" href=\"https:\/\/web.archive.org\/web\/20191022165101\/http:\/\/www.confickerworkinggroup.org:80\/wiki\/pmwiki.php\/Main\/HomePage\" target=\"_blank\" rel=\"noopener noreferrer\">Conficker Working Group<\/a>) was formed to coordinate a response.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107256\" title=\"45% of malware related spam mails are delivered by machines infected by the Conficker worm\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email.jpg?resize=94%2C100&#038;ssl=1\" alt=\"45% of malware related spam mails are delivered by machines infected by the Conficker worm\" width=\"94\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email.jpg?resize=142%2C150&amp;ssl=1 142w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email.jpg?resize=71%2C75&amp;ssl=1 71w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email.jpg?w=336&amp;ssl=1 336w\" sizes=\"auto, (max-width: 94px) 100vw, 94px\" \/>Despite the unprecedented industry effort, Trend Micro observed that <strong>six years later<\/strong> (2014 Q2), more than <strong>45% of malware-related<\/strong>\u00a0<strong>spam<\/strong> mails are delivered by machines infected by the <a title=\"Conficker\" href=\"http:\/\/en.wikipedia.org\/wiki\/Conficker\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Conficker worm<\/a>. Analysis by the AV firm of spam campaigns delivering <a title=\"FAREIT\" href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/?s=FAREIT&amp;Submit=+Go+\" target=\"_blank\" rel=\"noopener noreferrer\">FAREIT<\/a>, <a title=\"MYTOB\" href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/?s=mytob&amp;Submit=+Go+\" target=\"_blank\" rel=\"noopener noreferrer\">MYTOB<\/a>, and <a title=\"LOVGATE\" href=\"https:\/\/web.archive.org\/web\/20151008225522\/http:\/\/about-threats.trendmicro.com\/us\/search.aspx?p=LOVGATE\" target=\"_blank\" rel=\"noopener noreferrer\">LOVGATE<\/a>\u00a0 payload in email attachments are attributed to Conficker infected machines.<\/p>\n<h3>Over 1.1 million\u00a0IPs related to Conficker.<\/h3>\n<p>On Thursday, July 3 the Conficker Working Group detected +\/- <strong>1,131,799 unique IPs<\/strong> related to Conficker. Whatever the number,\u00a0 it&#8217;s still a big number, for a 6-year old malware with a patch. Trend explains that the IPs use various ports and are randomly generated via the DGA ability of the malware. A number of machines are still infected by this threat and leveraged to send the spammed messages to further increase the number of infected systems.<\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em>With Microsoft <a title=\"Windows XP Support Ending \u2013 Now What?\" href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/windows-xp-support-ending-now-what\/\" target=\"_blank\" rel=\"noopener noreferrer\">ending the support<\/a> for Windows XP this year, we can expect that systems with this OS will be infected by threats like Conficker for a long time to come. It is going to <a title=\"Windows XP support ends today. But it\u2019s still used everywhere from governments to ATMs\" href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/04\/08\/windows-xp-support-ends-today-but-its-still-used-by-everywhere-from-governments-to-atms\/\" target=\"_blank\" rel=\"noopener noreferrer\">take years <em>to work XP out of the system.<\/em><\/a><\/em><\/p>\n<p><em><a href=\"https:\/\/www.statista.com\/chart\/2322\/market-share-of-desktop-operating-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-107258\" title=\"End Of Support Changes Little About Windows XP's Popularity \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chartoftheday_market_share_of_desktop_operating_systems.jpg?resize=400%2C285&#038;ssl=1\" alt=\"End Of Support Changes Little About Windows XP's Popularity \" width=\"400\" height=\"285\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chartoftheday_market_share_of_desktop_operating_systems.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chartoftheday_market_share_of_desktop_operating_systems.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chartoftheday_market_share_of_desktop_operating_systems.jpg?resize=150%2C107&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chartoftheday_market_share_of_desktop_operating_systems.jpg?resize=768%2C547&amp;ssl=1 768w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/em><\/p>\n<p><em>Even with an ancient OS, there are ways to prevent Conficker<\/em><\/p>\n<ol>\n<li><em>Upgrade &#8211; Kudos to MSFT, Windows 7 has been resilient so far<\/em><\/li>\n<li><em>Patch your systems<\/em><\/li>\n<li><em>Keep Anti-Malware up to date<\/em><\/li>\n<li><em>Stay away from shady places on the web<\/em><\/li>\n<li><em>Be wary of email attachments &#8211; Don&#8217;t open what you don&#8217;t know<\/em><\/li>\n<li><em>The Conficker Working Group has an easy way to check if your machine is infected with Conficker <a title=\"Conficker Eye Chart\" href=\"https:\/\/web.archive.org\/web\/20191021182559\/http:\/\/www.confickerworkinggroup.org:80\/infection_test\/cfeyechart.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/em><\/li>\n<\/ol>\n<h6>Related articles<\/h6>\n<ul>\n<li>Mobile malware: Past and current rends, prevention strategies (cloudentr.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After 6 years and a Microsoft patch, the Conficker worm still impacts over 1 million IP addresses says TMICY.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[2292,1754,767,2184,23,82,421,2185,152,11,445,1756],"class_list":["post-70458","post","type-post","status-publish","format-standard","hentry","category-malware","tag-2292","tag-1754","tag-conficker","tag-conficker-working-group","tag-malware","tag-microsoft","tag-msft","tag-tmicy","tag-trend-micro","tag-vista","tag-windows","tag-xp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=70458"}],"version-history":[{"count":20,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70458\/revisions"}],"predecessor-version":[{"id":132296,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70458\/revisions\/132296"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=70458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=70458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=70458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}