Contents page

  1. Introduction......................................................................................
  2. How the Conficker worm works....................................................
  3. Where it will attack.........................................................................
  4. How fast it spreads........................................................................
  5. The damage it caused..................................................................
  6. Defences against it.......................................................................
  7. Legal issues..................................................................................
  8. Reference ...................................................................................

Conficker Worm

  1. Introduction

One of the most widespread pieces of malevolent code released in recent years was the Conficker worm and its variants. These have been given different designations, but all have a similar impact. The variants are named:

  • Worm:Win32/Conficker.A (Microsoft)
  • Crypt.AVL (AVG)
  • Trojan:Win32:Pakes.lxf (F-Secure)
  • Trojan.Win32.Pakes.ixf (Kaspersky)
  • W32:Downandup (Symantec)
  • Worm:Win32/Conficker.B (Microsoft)
  • WORM_DOWNAD.A (Trend Micro)

First released in October 2008, the worm aims at exploiting a known vulnerability in the Windows operating system and affecting an estimated 2.9 million machines by early 2009.

The worm’s operation, how it spreads, and the damage caused is described. Also defensive measures, legal issues, and preventive measures are recommended.  

  1. How the Conficker worm works

The worm does not spread over email or the Web. However if an infected computer is connected to your corporate network, it will immediately scan the network looking for machines to infect. These will be machines that have not installed a patch from Microsoft known as HYPERLINK. The worm will also scan company networks trying to guess your password, trying hundreds and hundreds of common words. If it gets in, even if you are not at your machine, it will infect and begin spreading to other servers.  A third method of spreading is via USB flash drivers

The Conficker worm spreads across networks and on finding a vulnerable machine, disables some security services, blocks access to some security sites, disables automatic backup services and deletes previous restore points. It makes infected computers open to receive additional malware code and tries to replicate itself to other machines on the same network.

The Microsoft operating system vulnerability (MS08-067) is utilised to let the worm install itself on machines which have not already been patched. The worm spreads by copying itself to USB sticks and shared network folders.

Microsoft released a critical level security bulletin on 23rd October, at about the time the Conficker worm was released. It was entitled. Vulnerability in Server Service Could Allow Remote Code Execution (958644). Covering all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008.

Join now!

Machines which had not applied this patch were vulnerable. It is not uncommon in large organisations to wait for a suitable time before installing even critical patches because of the requirement in many cases to reboot the systems which may cause disruption to business

The worm operates by copying itself to a Windows system folder using a random name, modifies registry keys, attempts connection to well-used websites to obtain the public address of the target machine, and tries to download more malware from other sites.

Using a random port, it starts an HTTP server and scans for vulnerable machines to ...

This is a preview of the whole essay