Conficker Finally Awakes & Dumps Payload

Use Netsparker


So it seems something big was brewing with Conficker, they just didn’t want to do what everyone expected and unleash it on April 1st when all eyes were on them.

Smart move really, they kept quiet and waited a week or so after before dropping some fairly serious and complex payloads (encrypted rootkits).

It seems like they are going for the old ransom tactic and duping users into buying dodgy anti-virus software.

An updated version of the Conficker worm is installing malware that attempts to lure people into buying rogue anti-virus software. Security researchers also say the worm is downloading malware tied to the notorious Waledac botnet.

Conficker’s latest move may be tied to a scheme to lure users into downloading fake anti-virus software.

Security researchers monitoring the Conficker worm’s activities say the malware has been observed downloading a file detected by Kaspersky Lab as FraudTool.Win32.SpywareProtect2009.s.

“Once it’s run, you see the app interface, which naturally asks if you want to remove the threats it’s ‘detected,'” wrote Aleks Gostev on Kaspersky Lab’s Analyst’s Diary blog. “Of course, this service comes at a price—$49.95.”

There is also some links to Waledac a supposed next-gen botnet for spamming purposes that came shortly after the demise of Storm.

It seems like Conficker is not going to be laying dormant any more, perhaps they weren’t making enough from renting out sections to spammers and DDoSers – now they really want to monetize the infected machines they have gathered.

In addition to that file, the worm is also now downloading the Waledac malware, which steals passwords and turns computers into bots for spamming operations. Waledac has emerged as a key part of spamming operations over the past several months, and is widely considered a reincarnation of the infamous Storm botnet.

“Fear is used, universally, as a means to control people,” said Sendio CTO Tal Golan. “Governments use it. Large businesses use it. So it should come as no surprise to anyone that ‘cyber-bad guys’ use it.”

At the moment, the rogue anti-virus software comes from sites located in the Ukraine (131-3.elaninet.com.78.26.179.107) although the worm is downloading it from other sites, according to Kaspersky Lab.

Unsurprisingly the source for much of the rogue software is in Eastern Europe, a hotspot for cybercrime and hackers skilled in malware and cryptography.

There’s some updates from F-Secure here:

New Conficker action

Source: eWeek

Posted in: Exploits/Vulnerabilities, Hacking News, Malware

, , , , ,


Latest Posts:


Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.
How To Recover When Your Website Got Hacked How To Recover When Your Website Got Hacked
The array of easily available Hacking Tools out there now is astounding, combined with self-propagating malware, people often come to me when their website got hacked and they don't know what to do, or even where to start.


12 Responses to Conficker Finally Awakes & Dumps Payload

  1. Bogwitch April 10, 2009 at 5:14 pm #

    I wonder if the long Easter weekend has anything to do with the timing….

  2. HyPnOtIcHaCkEr April 11, 2009 at 1:06 pm #

    doubt it ^^

  3. Morgan Storey April 12, 2009 at 12:42 pm #

    @Bogwitch: if it were me thats when I would launch it. As great military strategists have said if you want to take over a country quickly do it on a long weekend.
    I fits for the update that was pushed out on the 1st, then the payload gets pushed a few days later after you verify your clients have updated.

    I am heartened by the work MS have actually done to contain this, but I think it will quickly disperse into several smaller and less newsworthy botnets, that is unless users actually update their os.

  4. Tom Allen April 13, 2009 at 7:27 pm #

    All that and they do this, couldn’t they have done something more spectacular like DDOS google.
    Fake Anti-virus. Lame.

  5. Bogwitch April 14, 2009 at 7:55 am #

    @Tom Allen,

    I understand what you’re saying, but their motivation is not fame or noteriety, but cash. There is no profit in a DDOS of Google, unless a blackmail attempt on Google would be successful, which I doubt and the fake AV is charged at a high rate which should make the controllers a tidy sum, given the supposed number of infections.

  6. Bogwitch April 14, 2009 at 11:51 am #

    @HyPnOtIcHaCkEr

    On what do you base that?

  7. HyPnOtIcHaCkEr April 14, 2009 at 4:20 pm #

    A whim.

  8. Bogwitch April 14, 2009 at 4:45 pm #

    @HyPnOtIcHaCkEr

    Intelligent input darlin’ why don

  9. HyPnOtIcHaCkEr April 14, 2009 at 5:46 pm #

    No one likes a hater so stop being one.

  10. Bogwitch April 14, 2009 at 7:48 pm #

    Not a hater, just suggesting that if you are going to cast doubt on my suppositions, you should be prepared to back it up with a reasoned arguement rather that the diatribe you spouted.

  11. Tom April 15, 2009 at 1:20 am #

    lol really, you call ‘^^’ or ‘a whim’ a diatribe?

  12. Darknet April 15, 2009 at 5:19 am #

    I think perhaps he meant drivel rather than diatribe.