We did mention Conficker when it broke out back in January causing one of the largest scale infections ever seen (an estimated 9 million machines in just a few months).
The latest news is that Microsoft are offering a bounty to catch the author of the malware, we have seen this back in 2003/4 (The Anti-virus Reward Program) but it’s been pretty dormant since then. An interesting move some might say, but really, will it work?
Microsoft is offering a $250,000 reward for information that leads to the arrest and conviction of the virus writers behind the infamous Conficker (Downadup) worm.
The bounty, announced Thursday, represents a revival of Microsoft’s mothballed Anti-virus Reward Program, launched in 2003 and virtually moribund since 2004.
In 2003, Redmond put up a $250,000 reward for tips leading to the arrest and conviction of the virus writers behind the infamous SoBig and Blaster worms. It extend this offer to other examples of malware, but there’s only ever been one payout.
Erstwhile college friends of German VXer Sven Jaschan, who was convicted of writing the Sasser worm, picked up a $250,000 payout for their efforts.
So it shows in some circumstances it can work, some ‘friends’ of the Sasser author grassed him up and earnt themselves a tidy pay packet.
It just shows, you can’t really trust anyone nowdays. They haven’t been running this program on any of the interim malware explosions however, so it’ll be interested to see if times have changed and any results will be yielded.
Conficker has infected 10 million computers, going by recent estimates, so it’s no great surprise to find that Microsoft has reactivated the program. Even if it doesn’t lead to any arrests, the possibility of betrayal will give the authors of the worm pause for thought before they activate the monster botnet their malware has established.
In related news, Microsoft is partnering with security researchers, the Internet Corporation for Assigned Names and Numbers (ICANN), and operators within the domain name system to disable domains used by Conficker. Infected machines are programmed to dial into a constantly varying pre-programmed range of servers every day in order to obtain instructions.
Seperately OpenDNS rolled out a Conficker tracking and blocking scheme earlier this week.
It looks like a lot of measures are going into place to limit the damage Conficker can cause and attempting of course to stop it spreading far and wide.
With 10 million infections already, I think they have a lot of catching up to do and a lot of work ahead of them.
Source: The Register
- Security Vendor Trustwave Named In Target Suit
- Target CIO Beth Jacob Resigns After Huge Breach
- Stuxnet 2 Under Development By Spy Agencies?
- Mozilla Increases Security Bug Bounty To $3000
- New Conficker Variant More Aggressive
- How to Scan for Conficker Worm
Most Read in Legal Issues:
- Class President Hacks School Grades - 80,479 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,402 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,449 views