Conficker Followed up by Scareware-Powered SpamBy Frank Ohlhorst | Posted 2009-04-09 Email Print
WEBINAR: Event Date: Tues, December 5, 2017 at 1:00 p.m. ET/10:00 a.m. PT
How Real-World Numbers Make the Case for SSDs in the Data Center REGISTER >
As heightened security concerns fade along with the Conficker threat, some old and some new pieces of malware, many in the form of scareware, are rearing their ugly heads to cause potential havoc.
Preparation and persistence helped many to dodge the Conficker threat, and while many may have dodged that bullet, the war against malware is far from over. The recently released Microsoft Security Intelligence Report (SIR), which covers the final 6 months of 2008, indicates that rogue security software threats are on the rise. Those pieces of malware, also known as scareware, has increased significantly and is duping users into revealing important information and opening access to their systems to parties unknown.
Scareware works by leveraging users’ fears of cyber-attacks by mimicking legitimate advertisements for products that "fix" infected systems. Users are enticed to pay for "full versions" of the offered product to protect their systems from Trojans, worms and other kinds of malware. In reality, both the free and paid for versions of the mock utilities offered are actually malware applications. Those who choose to pay for the mock security software are providing nefarious individuals with credit information, while those who choose to accept "free offers" are setting their systems up to be compromised remotely or at the very least, have their systems turned into zombies spewing spam on a botnet.
While we may thank the hype surrounding Conficker for increasing security awareness, one has to wonder how many new "victims" were recruited by the purveyors of scareware leveraging that hype. Add to that the re-emergence of some old worms, such as W32.Downadup and W32.Waledac, and it becomes easy to see that another malware and spam storm is on the horizon.
The .C variant of W32.Downadup is particularly resilient, it incorporates a previously unseen algorithm to remove itself from the infected host on May 3, 2009, removing most traces that the system has been infected and compromised. Of even greater concern is how W32.Downadup may be linked to W32.Waledac, which steals sensitive information, turns computers into spam zombies, and establishes a back door remote access.
The pieces are in play and users need to protect themselves from these new merged threats, which may be responsible for the latest increases in spam and have the potentially to power another round of fraudulent and malicious activity.
Luckily, protection should be simple, just as simple as Conficker – install the latest patches and make sure you are using legitimate anti-malware products. The old buyers axiom still reigns supreme – if it seems too good to be true – then it probably is.
The questions remain: Did Conficker actually succeed in a way not anticipated? Did thousands, if not millions of users download phony security tools to combat the Conficker threat? Only time will answer those questions, and perhaps IT professionals will pull together to stamp out the coming threats.