The "No Network is 100% Secure" series
- Conficker Worm -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
![]()
Warning!!!!!: Don't use "free" security scans that pop up on many web sites. 
All too often these are fake, using scare tactics to try to get you to purchase 
their "full" service. In many cases these are actually infecting you while they run. 
There is reason to believe that the creators of the Conficker worm are associated 
with some of these fake security products. 
Worried about Conficker (or the gazillion other viruses, trojans, worms 
and so on that are out there?  Well, you should be! Even if you have a 
professional IT Staff and even if you've already deployed firewalls, anti-virus 
software and so forth, you still may be vulnerable.  If nothing else, our 
"No Network is 100% Secure" series of white papers has raised your awareness 
that constant vigilance is key.  Consider for a moment what it would cost 
your company in lost revenue and lost productivity if the conficker worm 
(or some other virus) has already infected your network.  And what about 
protection for customer information, data, records, credit card numbers 
and so forth? We're somewhat biased, of course, but we believe that having 
your site audited by professional security Consultants such as 
Easyrider LAN Pro 
just plain makes good sense in these trying and dangerous times. 
An ounce of prevention is better than a pound of cure, right? So would you 
prefer to pay a little to have the security of an independent site security 
audit or would you rather have Consultants spend a week or two on your site trying 
to clean up the mess a hacker left behind?
What the big deal about Conficker?: Think about the worst virus you've ever 
dealt with.  Conficker is like that virus on steroids.  At this time, no one 
(except the creators) know what the true plan for this worm is.  What is known 
is that millions of computers worldwide have already been infected and that 
once infected, this worm can be very difficult to get rid of.  The worm has also 
morphed into many different strains to the degree where even professional anti 
virus software companies are having a very difficult time keeping up.  As an example, 
Symantec has been updating their virus definitions every 5 minutes!  AVG software 
is now recommending that it's users update virus definitions every four hours 
whereas just a year or two ago, updating once a day seemed like over-kill.
What is the Conficker worm?: Win32/Conficker is a worm that infects other 
computers across a network by exploiting a vulnerability in the Windows Server 
service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could 
allow remote code execution when file sharing is enabled. Depending on the 
specific variant, it may also spread via removable drives and by exploiting weak 
passwords. It disables several important system services and security products 
and downloads arbitrary files.
Also Known As:
TA08-297A (other)
 
CVE-2008-4250 (other)
VU827267 (other)
 
Win32/Conficker.A (CA)
Mal/Conficker-A (Sophos)
 
Trojan.Win32.Agent.bccs (Kaspersky)
W32.Downadup.B (Symantec)
 
Trojan-Downloader.Win32.Agent.aqfw (Kaspersky)
W32/Conficker.worm (McAfee)
 
Trojan:Win32/Conficker!corrupt (Microsoft)
W32.Downadup (Symantec)
 
WORM_DOWNAD (Trend Micro)
 
Confickr (other)
 
Microsoft strongly recommends that users apply the update referred to in Security 
Bulletin MS08-067 immediately.  Microsoft also recommends that users ensure that 
their network passwords are strong to prevent this worm from spreading via weak 
administrator passwords. Visit 
Microsoft for more information. 
Home users can apply a simple test for the presence of a Conficker/Downadup infection 
on their home computers.  The presence of a Conficker/Downadup infection may be 
detected if a user is unable to surf to their security solution website or if they are
unable to connect to the websites, by downloading detection/removal tools available 
free from those sites:
Symantek
Microsoft
McAfee
If a user is unable to reach any of these websites, it may indicate
a Conficker/Downadup infection.  The most recent variant of
Conficker/Downadup interferes with queries for these sites,
preventing a user from visiting them.  If a Conficker/Downadup
infection is suspected, the system or computer should be removed
from the network or unplugged from the Internet - in the case for
home users.
Impact: A remote, unauthenticated attacker could execute arbitrary code on
a vulnerable system. Readers should note that much is not known about this worm 
so the information in this white paper should NOT be considered as 100% 
complete.  It is believed that not all machines infected with conficker 
will exhibit symptoms immediately.  This worm has "call home" capailities 
whereby the worm will check in (with the worm author, presumably) periodically 
for instructions.  It is estimated that millions of computers worldwide have 
already been infected with this worm.  Needless to say, this infection would 
create a substantial "botnet" that could be used to wreak havoc on the Internet.
What does the Conficker worm do?: The Conficker worm has created secure 
infrastructure for cybercrime. The worm allows its creators to remotely install 
software on infected machines. What will that software do? The short answer is 
that no one (except the authors) know. Most likely the worm will be used to create 
a botnet that will be rented out to criminals who want to send SPAM, steal IDs and 
direct users to online scams and phishing sites. 
The Conficker worm mostly spreads across networks. If it finds a vulnerable computer, 
it turns off the automatic backup service, deletes previous restore points, 
disables many security services, blocks access to a number of security web sites 
and opens infected machines to receive additional programs from the malware's 
creator. The worm then tries to spread itself to other computers on the same network. 
How does the worm infect a computer?: The Downadup worm tries to take 
advantage of a problem with Windows (a vulnerability) called MS08-067 to quietly 
install itself. Users who automatically receive updates from Microsoft are already 
protected from this. The worm also tries to spread by copying itself into shared 
folders on networks and by infecting USB devices such as memory sticks. 
Infection process: 
Conficker is delivered as a Dynamic Link Library (DLL), so it cannot run as a 
standalone program and must be loaded by another application. A vulnerable Windows 
system is generally infected with the Conficker worm via the MS08067
vulnerability, using exploit shellcode that injects the DLL into the running Windows
server service. Other possible infection vectors are accessing network shares or 
USB drives where the malicious DLL is started via the rundll32.exe application. 
Once infected, Conficker installs itself as a Windows service to survive reboots. 
It then computes domain names using a timeseeded random domain
name generator and attempts to resolve these addresses. Each resolved address is 
contacted and a HTTP download is attempted. No successful HTTP download was witnessed 
until the middle of March 2009, at which point security experts observed nodes that 
downloaded encrypted binaries from some of the randomly generated domains.
Thinking about ways to attack Conficker's infrastructure, this DNS based update 
feature is obviously a potential target. However, Conficker uses RSA signatures to 
validate the downloads and rejects them if the check fails, and attacking RSA is 
not feasible.
Conficker version control: Conficker is definitely a sophisticated piece of 
malware with built-in version control! 
Each Conficker version installs a couple of named mutexes during startup,
to make sure that older version of the code are not run. This is achieved by 
registering all previous mutex names plus an additional mutex with a different 
name in each version. If mutex creation fails, this indicates
that another Conficker version is already running which is at least as recent as 
the one currently being executed. However, there seems to be a flaw in 
conficker's mutex generation mechanism mechanism. It is assumed that the
Conficker authors made a mistake that effectively renders the concept of 
using mutual exclusion useless. Possibly fixed in the next release?  
It is quite common in modern malware to patch a vulnerability after successful 
exploitation, to prevent other malware from also infecting the compromised system. 
Conficker is no exception here. Conficker.B contains a routine to update itself 
by scanning incoming exploitation attempts from other
infected machines and downloading the new malware binaries from the attacker.
Conficker generates a series of domain names from which it tries to download updates. 
Conficker.A and .B create 250 domains per day. This puts high load on the contacted 
domains and can easily lead to a denial of service against them. Various organizations 
have made efforts to attempt to preregister these 2 x 250 daily
domains in order to hinder Conficker from retrieving updates and to track infected 
hosts. Conficker.C tries to evade this defensive approach by creating 50.000 domains 
per day, making preregistration logistically challenging. Conficker.C randomly 
chooses 500 out of these domains, which are then contacted for updates.
connections attempts.  After an unsuccessful update attempt, Conficker.C sleeps for 
24 hours. In the case of a successful update, Conficker
waits 4 days before continuing to attempt to download new updates. Since the next 
domain to be contacted is chosen randomly, the load is equally distributed over 
many name servers but leads to the problem that there
is no guaranteed set of domains that is contacted on a given day by every host, 
significantly increasing the effort involved in mitigation at the sinkhole or 
DNS registrar level.
Conficker employs HTTP requests for updates, which hide update requests amongst the 
regular web traffic patterns found in most networks. To be even more stealthy, 
Conficker preresolves the domain names and uses only plain IP addresses in the HTTP 
Host header. Thus, the use of application level gateways and hostbased
filtering of this traffic is not easily possible.
Conficker variants .B and .C contain blacklists of IP address ranges to prevent 
them from attacking and contacting hosts related to antivirus vendors (AV), some 
security companies, and Microsoft! The introduction of blacklists in
.B can therefore be seen as an improvement for avoiding detection from AVs and 
Microsoft, and evidence of the worm's author's continuing response to developments 
in the whitehat community. As the corporate systems typically owned by this type of 
organization are more likely to be fully patched against the MS08067
exploit, this behavior may also increase spreading performance by avoiding low 
return netblocks.
Who is at risk?: Users whose computers are not configured to receive patches 
and updates from Microsoft and who are not running an up to date antivirus product 
are most at risk. Users who do not have a genuine version of Windows from Microsoft 
are most at risk since pirated system usually cannot get Microsoft updates and patches. 
Question: Am I safe if I don't go to questionable web sites? 
Answer: No. The Conficker worm seeks out computers on the same network. 
You can be in a coffee shop, an airport or in the office and the worm will 
quietly try to attach to your computer and run itself. 
Conficker removal: Not the easiest thing to do.... 
Conficker versions have introduced more and more security checks to avoid removal. 
Beyond blocking access to anti-virus web sites, one is the detection of removal 
tools. In order to apply disinfection or vaccination tools, Conficker has to be 
terminated first, which is hard without being able to apply a removal tool.
A major barrier to easy termination is that Conficker runs inside another process. 
In most cases, this is a system process, such as svchost.exe. These processes 
cannot simply be terminated as this would obviously lead to system instability. 
When Conficker is wiped from running memory it should be noted that this disinfection 
is only temporary and Conficker will be reloaded after reboot unless further steps 
are taken.
Several organizations have reported that computers which have been cleaned of 
Conficker infections were immediately reinfected on restart. There are several 
possibilities for the cause of this behavior. One is that Conficker's autostart 
ability and ondisk binaries were not correctly removed. Another is that the computers
were immediately reinfected by other compromised computers via the (local) 
network.
Next in the security white paper series: 
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
More 2009 hacks in the news
Still more 2009 hacks in the news
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
Firewall White Paper
Virus White Paper
GhostNet White Paper
Password White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Port Scanning White Paper
Shelfware White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Outsourced IT White Paper
Trojan Virus Attacks White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
![]()
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro