Security BB Conficker
Security BB Conficker
Security BB Conficker
(conficker)
11/11/2009
FarudBump
Agenda
2
Conficker – quick facts
ØState-of-the-art malware
ØHighly multithreaded
being updated)
ØMost probably created by a group located in Ukraine
3
How Conficker spreads
m
o
a
x
r.c
)
.d
y rg
ip
h
e
k
c
,n
o
s
.otm
ip
y(g
er,
e
rv
s P
b
u
lic
Get its own public IP
445
Port
Updates etc.
1 •Starts listening to ports
2
Generates random IPs (with the
5 exception of Ukraine)
5
4 5
4 5
4 5
4
P
o
rt P
o
rt P
o
rt P
o
rt
4
How Conficker hides
engineering defenses
ØIt gives itself a random name in the Windows system32
5
How Conficker gets updates
Registers one of
the random
domains for future A
Generates pseudorandom
domains based on current Creates a new version/
date – 250 .com, .net, .org, payload /any new
instruction for Conficker
..info, and .biz domains B Digitally signs it with
private key (MD6)
m
in
eh
a
c C
tdin
fe
c 1 Hits several out of 250
generated to check if
e
k C
n
o
fic
r-
there’s anything new. Bingo! Hits the right
2 domain. Uploads the package
to the server
3
Downloads the payload.
As of April 2009,
Conficker switched to
probing 500 domains
from the list of 50.000
pseudo-randomly
generated domains 6
What Conficker does? What it can do?
ØWaledac spambot
fraud etc.),
ØMost importantly - Conficker can avoid server-side fraud
7
How to diagnose and protect
http://www.confickerworkinggroup.org/infection_test/cfeyechart.html*
ØRun malware removal tools – e.g. Microsoft Malicious