Author Topic: Conficker copycat prowls for victims, says Microsoft!  (Read 1956 times)

0 Members and 2 Guests are viewing this topic.

samuelvirucide

  • Guest
Conficker copycat prowls for victims, says Microsoft!
« on: April 06, 2009, 10:26:54 AM »
  :)  Hi avast forum members,

        Four-year-old Neeris worm copies Conficker's attack strategies,


        April 5, 2009 (Computerworld) An old, but little-known worm has copied some of the infection strategies of Conficker, the worm that raised a ruckus last week, Microsoft security researchers said late Friday.

Neeris, which harks to May 2005, is now exploiting the same Windows bug that Conficker put to good use, and is spreading through flash drives, another Conficker characteristic, said Ziv Mador and Aaron Putnam, researchers with the Microsoft Malware Protection Center.

According to Mador and Putnam, Neeris' makers recently added an exploit for the MS08-067 vulnerability that Microsoft patched last October. The emergency update -- one of the rare times Microsoft has issued a patch outside its usual monthly scheduled --- fixed a flaw in the Windows Server service, which is used for file- and print-sharing by Windows PCs.

Conficker, the worm that began using a new communications scheme to receive commands from its hacker controllers last Wednesday, exploited the same MS08-067 vulnerability to devastating effect in late 2008 and early 2009. During January, for instance, Conficker infected millions of machines, many of them by exploiting MS08-067.

"Neeris [also] spreads via Autorun," Mador and Putnam said in an entry to the malware center's blog. "The new Neeris variant even adds the same 'Open folder to view files' AutoPlay option that Conficker does."

Conficker spread from infected PCs by adding an autorun.inf file to the root directory of any USB-based device, primarily flash drives. Later, when the drive was connected to an uninfected computer, the autorun.inf file silently copied the worm to the machine.

Mador and Putnam speculated that the authors of Conficker and Neeris might be in cahoots. "The earliest samples of Neeris date back to May of 2005, so it seems the Conficker authors may be the copycats here," the argued. "But the Neeris authors added the MS08-067 vector later. Therefore it is possible that these miscreants somehow collaborate or at least are aware of each other's 'products.'"

Coincidentally, the newest version of Neeris started appearing late on March 31 and on the following day, April 1. The latter date was when Conficker boosted the number of domains it could use to route instructions from its controllers, a deadline that sparked a frenzy of doomsday warnings.

"However, [Neeris] was not downloaded by any Conficker variant and there's no evidence that it's related to [Conficker.c's] April 1 domain algorithm activation," said Mador and Putnam.

Although Neeris was first identified nearly four years ago, Microsoft has not added a "fingerprint" for the worm to its Malicious Software Removal Tool (MSRT), the anti-malware utility that the company updates and redistributes each month to Windows machines. The MSRT scans for known malware, then scrubs the system of any it finds. Microsoft added Conficker detection to the MSRT in mid-January.

"Due to the similarities to Conficker, most of the mitigations that were mentioned also apply here," said Mador and Putnam. "Make sure to install MS08-067 if you haven't done so yet and be careful to use only AutoPlay options you're familiar with, or consider disabling the Autorun altogether."

    source:                            http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131139

Offline Confused Computer User

  • Avast Evangelist
  • Advanced Poster
  • ***
  • Posts: 700
  • The answer is 42
Re: Conficker copycat prowls for victims, says Microsoft!
« Reply #1 on: April 06, 2009, 02:53:30 PM »
Suspense, intrigue, living life by the edge of the code.....Confiker the movie... coming soon to a theater near you 8)

Joking aside doesn't it seem more and more obvious that MS is not doing a good job. Not only do I have to contend with problems due to the Visual aspect which is a resource hog but the vulnerability issue is the cherry on top of the icing.

At least there is Avast and the Forum which provide an efficient blanket of safety and support.
Computer Systems:

Intel Pentium 4 641 / 2GB RAM / Vista Home Basic SP2 / avast! 5.0 Home / SAS Free / MBAM Free / Windows Defender / Windows Firewall / Spyware Blaster/ Secunia PSI / Firefox 3.6 / Opera 10.5

Core2Duo T8300 / 4GB RAM / Vista Home Premium SP2 (32 bit version) / Same Software.

Alan Baxter

  • Guest
Re: Conficker copycat prowls for victims, says Microsoft!
« Reply #2 on: April 06, 2009, 05:47:33 PM »
More FUD and knee-jerk MS bashing.  So, something's exploiting the same patched vulnerability that Conficker does.  Big deal.  I'm very interested in hearing about exploits for unpatched vulnerabilities, of course, but reporting on Neeris like this is mostly media self-promotion.

BTW, MSRT isn't designed to replace an AV.  I couldn't care less if someone identifies one attack vector that MSRT doesn't attempt to remove, since there's no need to use MSRT on a computer that isn't infected already.