New homeland security tool to detect Conficker worm

The US Department of Homeland Security released a tool to detect whether a computer is infected by the Conficker worm
The US Department of Homeland Security released a tool to detect whether a computer is infected by the Conficker worm

The US Department of Homeland Security released a tool on Monday to detect whether a computer is infected by the Conficker worm.

The department, in a statement, said the detection tool for the Conficker worm, also known as DownAdUP, had been developed by the US Computer Emergency Readiness Team (US-CERT).

"While tools have existed for individual users, this is the only free tool -- and the most comprehensive one -- available for enterprises like federal and state government and private sector networks to determine the extent to which their systems are infected by this worm," said US-CERT director Mischel Kwon.

"Our experts at US-CERT are working around the clock to increase our capabilities to address the cyber risk to our nation's critical networks and systems, both from this threat and all others," he added.

The worm is suspected to have infected million of computers running the and Windows maker Microsoft has offered a 250,000 dollar bounty for those responsible for the worm.

US-CERT recommended that Windows users apply Microsoft security patch MS08-067 to help provide protection against the worm.

The patch is designed to prevent an attacker from remotely taking control of an infected computer system and installing additional .

Malware could be triggered to steal data, generate spam attacks or turn control of infected computers over to hackers amassing "zombie" machines into "botnet" armies.

The worm is programmed to modify itself on Wednesday, April Fool's Day, according to specialists.

Conficker had been programmed to reach out to 250 websites daily to download commands from its masters, they said, but on Wednesday it will begin connecting with 50,000 websites daily for instructions.

The hackers behind the worm have yet to give it any specific orders.

"That's the interesting thing. The only thing the worm is being asked to do is to ask for further instructions," Steve Trilling, vice president of security firm Symantec, told the CBS program "60 Minutes" in a story aired on Sunday.

More information:
-- US-CERT recommends that Windows Operating Systems users apply Microsoft security patch MS08-067 (www.microsoft.com/technet/secu … lletin/MS08-067.mspx) as quickly as possible to help protect themselves from the worm.

-- Instructions, support and more information on how to manually remove a Conficker/Downadup infection from a system have been published by major security vendors. Each of these vendors offers free tools that can verify the presence of a Conficker/Downadup infection and remove the worm:

Symantec:
www.symantec.com/business/secu … =2009-011316-0247-99
Microsoft:
support.microsoft.com/kb/962007
www.microsoft.com/protect/comp … worms/conficker.mspx

(c) 2009 AFP


Explore further

The Raging Windows Worm has attacked over 8.9 Million Computers

Citation: New homeland security tool to detect Conficker worm (2009, March 30) retrieved 19 September 2019 from https://phys.org/news/2009-03-homeland-tool-conficker-worm.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
0 shares

Feedback to editors

User comments

Mar 30, 2009
Hopefully as our populace becomes more internet and computer savvy, things like this will have less impact.



http://blog.benchside.com

Mar 30, 2009
I hate that kinda hackers and I hate why those Anti-Virus Softwares are too expensive. They are not affordable...

Mar 31, 2009
Its probably just going to continue asking for instructions until it has enough computers to do whatever it needs. (hacking the CIA database?)

Mar 31, 2009
Hopefully as our populace becomes more internet and computer savvy, things like this will have less impact.


The only current solution is to disconnect, but like social isolation, this is only part of the solution.

With the government providing a response to this virus, it is an indication of the threat posed by millions of interconnected computing devices under only partial control of their owners. Operating system developers, software distributors and retailers are currently ineffective in limiting the opportunities for large scale computing under corrupt or criminal control. The end users are insufficiently educated, and the commercial market can not afford to deter new consumers with a steep obligatory learning curve about Internet security. Hence, none exists apart from annoying and completely evadable pop-up warnings, (if anything at all), and the eventual disfunctionality of the computer due to viruses 'contracted'.

The virus writers are not going to stop. It is subversive science, but science none the less. Trial and error, measured success, progress and evolution. Organic and openly available to any inquisitive mind.

More, it has a commercial value that was recognised many years back by software companies ... the more viruses, the more anti-virus market. Worse, organised crime will use viruses, and the authors of them, to make money estimated to be far in excess of the profits of anti-virus software. Last, (if conspiracy like), we have only to imagine what governments world-wide are doing with this portal into our lives - and into each others national boundaries.

The fact is, most computer users are playing and socialising with a tool that can, if used correctly, bring a country/economy temporarily to its knees.

Who knows? Perhaps it is happening right now.

Paranoia is not going to help. Is the Internet, (and all that available raw computer processing power), as much a risk as a benefit? That is the question.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more