Computers infected by the Conficker worm will "phone home" to several legitimate URLs this month, including one owned by Southwest Airlines, potentially disrupting those sites, a security researcher has said.
According to a researcher at anti-virus firm Sophos, the Conficker worm - also known as Downadup - will try to contact wnsux.com on 13 March for further instructions. That URL, however, is owned by Southwest Airlines, and redirects visitors to the airline's primary southwest.com address.
"On March 13, the millions of machines infected with Conficker will be contacting wnsux.com for further instructions," said a Sophos researcher identified as MikeW in an entry on the company's blog . "They won't get any [instructions], but that may certainly disrupt the operation of southwest.com."
Once it has infected a PC, Conficker generates a list of 250 possible domains - the list changes daily - selects one, then uses that URL to reach a hacker-controlled server from which it downloads additional malware to install on the hijacked computer. The wnsux.com address is one of the 7,750 domains that the worm may use during March, said MikeW.
Previously, researchers had reverse-engineered the algorithm that determines any given day's list of command-and-control routing domains. Then, last month, nearly 20 technology companies and organizations, among them Microsoft. and ICANN, the non-profit group that manages the Internet Domain Name System, combined forces to disrupt the budding botnet by preemptively removing those addresses from circulation.
MikeW spotted several other legitimate sites on March's Conficker list, including jogli.com (Big Web Great Music) and qhflh.com (Women's Net in Qinghai Province), slated for "phone home" use on 8 March and 18 March, respectively.
These domains may be affected by the worm itself or by the steps network administrators have taken to protect their PCs, said MikeW. "Those millions of Conficker infected machines contacting the domain on its given day may overload the site and essentially result in a denial-of-service attack," he said.
According to F-Secure, at least 2.1 million PCs are currently infected with the Conficker worm. "[Or] they may end up on a blocklist [that would ] prevent users from accessing their services." Microsoft, for example, has posted a list of Conficker 's routing domains that IT administrators can use to block outbound "calls" from infected PCs.
MikeW said Sophos had contacted the owners of the domains on March's list, including Southwest. Currently, wnsux.com - which Southwest Airlines apparently acquired to stymie negative publicity - shunts users to Southwest Airlines' site and offers a message that reads in part, "Southwest wants to control the release of inaccurate and irresponsible information about the Company via the Internet."
Conficker first gained attention for exploiting a Windows vulnerability that Microsoft patched last October in one of its rare emergency updates. The worm has spread extensively since earlier this year, when a new variant appeared and quickly compromised as many as 9 million PCs within days.
Microsoft has also offered a $250,000 reward for information that results in the arrest and conviction of the hackers who created and launched Conficker, a move it last used in 2004.
Southwest Airlines was not immediately available for comment.