Conficker-detection method revealed by researchers

Just hours before the Conficker worm is set to contact its controllers for new instructions, researchers have discovered a flaw in the worm that makes it much easier to detect infected PCs.

Share

Just hours before the Conficker worm is set to contact its controllers for new instructions, researchers have discovered a flaw in the worm that makes it much easier to detect infected PCs.

Tillmann Werner and Felix Leder, members of the Honeynet Project, an all-volunteer organisation that monitors Internet threats, have discovered that Conficker-infected PCs return unusual errors when sent specially crafted Remote Procedure Call (RPC) messages, according to preliminary information they have posted on the web.

There's a growing urgency in the battle against Conficker as Wednesday approaches. PCs infected with Conficker.c, the third version of the worm, will use a new communication scheme starting April 1 to establish a link to the command-and-control servers operated by the hackers. What's troubling to researchers is that they have no clue about what orders the worm's makers will give those machines.

Using their discovery, Werner and Leder, along with Dan Kaminsky, the security researcher who last summer uncovered a critical flaw in the Domain Name System (DNS) software, spent the weekend crafting a scanner that lets users quickly sniff out Windows machines infected with the worm.

"You can literally ask a server if it's infected with Conficker, and it will tell you," Kaminsky said in an entry to his blog Monday.

The scanner, in turn, has been modified and added to enterprise-grade detection systems from companies such as McAfee, nCircle and Qualys, which plan to release updates today. The free open-source Nmap scanner is also slated to include the new detection capability.

"What Tillmann and Felix found was that Conficker systems react differently to certain RPC parameters," said Wolfgang Kandek, chief technology officer at Qualys. "The difference is very subtle."

Conficker-patched machines answer differently to the special RPC messages because the worm, which exploited a Windows vulnerability that Microsoft. patched last October, uses its own version of the Microsoft patch to effectively close the door behind it. Quashing a bug is a common tactic by malware authors to prevent other criminals from stealing their infected systems.

Because Conficker patched its victims, enterprises had trouble detecting which machines on their networks had been compromised by running standard vulnerability scanners, which look for unpatched machines. Werner and Leder, however, found a way to tell a Conficker-patched PC from a legitimately patched computer.

"Recommended For You"

Ministry of Defence hit by rapidly-spreading virus New attack code crashes Windows XP and Vista