We did mention Conficker when it broke out back in January causing one of the largest scale infections ever seen (an estimated 9 million machines in just a few months).
The latest news is that Microsoft are offering a bounty to catch the author of the malware, we have seen this back in 2003/4 (The Anti-virus Reward Program) but it’s been pretty dormant since then. An interesting move some might say, but really, will it work?
Microsoft is offering a $250,000 reward for information that leads to the arrest and conviction of the virus writers behind the infamous Conficker (Downadup) worm.
The bounty, announced Thursday, represents a revival of Microsoft’s mothballed Anti-virus Reward Program, launched in 2003 and virtually moribund since 2004.
In 2003, Redmond put up a $250,000 reward for tips leading to the arrest and conviction of the virus writers behind the infamous SoBig and Blaster worms. It extend this offer to other examples of malware, but there’s only ever been one payout.
Erstwhile college friends of German VXer Sven Jaschan, who was convicted of writing the Sasser worm, picked up a $250,000 payout for their efforts.
So it shows in some circumstances it can work, some ‘friends’ of the Sasser author grassed him up and earnt themselves a tidy pay packet.
It just shows, you can’t really trust anyone nowdays. They haven’t been running this program on any of the interim malware explosions however, so it’ll be interested to see if times have changed and any results will be yielded.
Conficker has infected 10 million computers, going by recent estimates, so it’s no great surprise to find that Microsoft has reactivated the program. Even if it doesn’t lead to any arrests, the possibility of betrayal will give the authors of the worm pause for thought before they activate the monster botnet their malware has established.
In related news, Microsoft is partnering with security researchers, the Internet Corporation for Assigned Names and Numbers (ICANN), and operators within the domain name system to disable domains used by Conficker. Infected machines are programmed to dial into a constantly varying pre-programmed range of servers every day in order to obtain instructions.
Seperately OpenDNS rolled out a Conficker tracking and blocking scheme earlier this week.
It looks like a lot of measures are going into place to limit the damage Conficker can cause and attempting of course to stop it spreading far and wide.
With 10 million infections already, I think they have a lot of catching up to do and a lot of work ahead of them.
Source: The Register
- More Drama About Hillary Clinton’s E-mail Leak – VNC & RDP Open
- Drones, Tor & Remailers – The Story Of A High-Tech Kidnapping
- Hacking Team Hacked – What You Need To Know
- Mozilla Increases Security Bug Bounty To $3000
- New Conficker Variant More Aggressive
- How to Scan for Conficker Worm
Most Read in Legal Issues:
- Class President Hacks School Grades - 80,656 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,541 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,555 views