Symantec warns a third variant of the Conficker virus is on the loose. It’s the nastiest strain yet, by dint of a new ability to disable security software, and block attempts to track where it phones home on the web.
In a tactical switch, Conficker's authors are sending the new strain to already-infected PCs, helping the worm burrow deeper and become more resistant to attempts to dig it out.
In a security update, Symantec’s Peter Coogan writes that the worm’s focus on holding-off antivius software is part of a new strategy overall:
“[It’s] authors are now aiming for increasing the longevity of the existing threat on infected machines. Instead of trying to infect further systems, they seem to be protecting currently infected machines from antivirus software and remediation.”
The new mutation also regains the initiative on generating random domain names, or web servers that infected machines phone home to. The previous version generated 250 random web address per day, using an algorithm that was successfully reverse-engineered by Microsoft, and others. The new Conficker variant, using a new algorithm, generates 50,000 domains - making it, for the time being, impossible to track and reversing one of the security software companies’ few wins in the war on the worm.
Symantec discovered the new variant of Conficker (also known as Downadup) Saturday New Zealand time when the fresh mutation - officially called W.32Downadup.C - was attracted to a “honeypot” - a PC purposefully left exposed to internet threats.
"Think of it as an updated module that's more aggressive, more robust in defending itself," says Vincent Weafer, vice president of Symantec Security Response.
The first two versions of the Conficker worm did not disable antivirus software.
The new variant attempts to disable antivirus software and security analysis tools - but Symantec is still gauging the new Conficker variant’s degree of success with this tactic, saying it is still in the early stages of analysing the new sample.
Still waiting for the other boot to drop
The new variant of the worm maintains its predecessor’s modus operandi. That is, it burrows into a PC, then “phones home” to one of the many Conficker servers to let the worm’s author’s now the infected machine is now ready to accept the virus’s payload.
A major conundrum: no payload has yet to be delivered, despite Conficker infecting upwards of 16 million PCs, making it the most virulent computer virus to ever sweep the planet.
Symantec says the new mutation, with its emphasis on keeping infected machines vulnerable for longer, may be an attempt by Conficker’s author’s to buy time.
But the question remains: for what?
De-worming
The two key defences against Conficker remain.
1. Keep your antivirus software up-to-date as possible through live updates.
2. Install Microsoft’s Conficker patch, which makes Windows less vulnerable. Microsoft has made patches available for all editions of Windows, but points out that the most recent version, Vista, is the most resistant to the worm.Microsoft's worm response center (Microsoft.com/conficker) has links to the patch, plus information and advice on Conficker's A and B strains, but as of Monday morning NZ time has yet to be updated for the new C strain.
(The NBR)