Analysis of the Conficker Worm
Sunday, June 21st, 2009Back in March, there was some concern about the Conficker worm. The linked article has a very readable overview of the worm, its history, what happened on April 1st, and what it’s up to now.
News and other tidbits that Chad Cloman finds interesting enough to share
Back in March, there was some concern about the Conficker worm. The linked article has a very readable overview of the worm, its history, what happened on April 1st, and what it’s up to now.
There’s a new virus/worm out, and it’s taking the web by storm. Here’s how it works:
To protect against Gumblar, do the following:
For those who have FTP programs installed with saved passwords, I suggest (1) configure your FTP client so it doesn’t save the passwords, and (2) change the passwords. Also, this article explains how to determine if your website is infected and lists methods to remove the malicious code.
Here at the Chad’s News network command center, we do external site/database backups on a weekly basis. The website in the linked article maintained a backup server but did not create an external or off-site backup. A hacker broke into their system and destroyed the data on both servers. Thirteen years of irreplaceable data lost.
Link: http://news.bbc.co.uk/…
(via Slashdot)
You’re a hacker who wants to break into a large web forum, steal their user data, and destroy their database. The site is using the latest software patches and has a large array of security features to prevent unauthorized intrusion. What do you do? Simple, hack into their off-site backup, which is not nearly as secure but still contains their database login credentials.
Well-informed Chad’s News readers may have heard about the latest variant of the Conficker worm and the fact that it’s going to do something on April 1st. Simply put, the impact of this worm has been exaggerated. First, all that will happen is that the worm will change how it operates. Second, any effects will occur on systems that have already been infected. Keeping Windows updated and using current anti-virus software should be sufficient to keep yourself protected.
Link: http://www.networkworld.com/…
(via Slashdot)
There’s a serious Firefox exploit that’s been published on the web. It relies on the user viewing a maliciously coded XML file. Mozilla is working on a patch, but until it’s ready, I recommend being careful about where and what you’re browsing.
Link: http://www.infoworld.com/…
(via Kim Komando)
Update: The fix is available now but won’t be pushed out via the update channel until next week.
There’s a new, critical flaw in the Adobe Reader software. Be careful about opening untrusted PDF files.
Link: http://www.infoworld.com/…
(via Kim Komando)
Update: The situation is getting even worse. On Windows systems it’s no longer necessary to even open the file.
Update #2: Adobe has released a fix.
From the Neatorama article: “Analyst Robert Graham of Dark Reading, a website dealing with computer security issues, authored a fascinating report on the recent hacking of the popular website phpbb.com. The hacker published approximately 20,000 passwords from the site.” Many of the passwords were blatantly insecure, but who really cares if someone hacks your forum account? I have a standard, throw-away password for things like that. My online banking passwords, on the other hand, are much more complicated.
Link: http://www.darkreading.com/…
(via Neatorama)
Turns out that wiping data from an SSD is much easier than from a traditional magnetic hard drive.
Link: http://www.computerworld.com/…
(via digg)
The linked article has a list of the 500 most common passwords. If any of your passwords are on the list, it may be time for change. The site doesn’t explain how the list was compiled, but the original source is Perfect Passwords: Selection, Protection, Authentication by Mark Burnett and Dave Kleiman.
Link: http://www.whatsmypass.com/…
(via Consumerist)
Apparently we are in the midst of a massive internet worm attack, the likes of which hasn’t been seen in years. Estimates of the number of compromised systems range from 6% to 30%. Let me clarify—that’s the percentage of all Windows computers in the world that have been taken over. The worm doesn’t destroy data on the target systems, it just turns them into ’bots for sending spam and creating DDOS attacks. Time to update those virus definitions and do a scan.
Link: http://www.computerworld.com/…
(via Kim Komando)
When your laptop is stolen, this new technology will lock the laptop, determine its location via built-in GPS, and send the location to a central server. Nice…
Link: http://www.marketwire.com/…
(via Engadget)