Page last updated at 08:25 GMT, Wednesday, 1 April 2009 09:25 UK

Worm attack chaos fails to strike

Clock, BBC
Industry experts are staying calm as the Conficker deadline approaches

The chaos predicted by some as the Conficker worm updates itself have so far failed to materialise.

There had been concerns that the worm could trigger poisoned machines to access personal files, send spam, clog networks or crash sites.

Many of the infected machines are based in Asia where there have been no reports of unusual PC behaviour.

Conficker is believed to have infected up to 15 million computers to date.

Those monitoring the progress of the worm as 1 April dawned around the globe said there was no evidence it was doing anything other than modifying itself to be harder to exterminate.

The hackers behind the worm, which effectively have all infected machines under their control, have yet to give the virus any specific orders.

But security experts warned that there was no room for complacency.

"We are going to be on high alert for a long time. Come 2 April we will still be watching while most people will have moved their focus elsewhere," said Vincent Weafer, vice president of security response at anti-virus firm Symantec.

He added: "We believe the software is geared towards making money. The characteristic of this type of worm is to keep it slow and low, keep it under the radar to slowly maximise profits over the long term."

Origins

FROM THE TODAY PROGRAMME

Conficker, also known as Downadup or Kido, first appeared last November. The worm is self-replicating and has attacked a vulnerability in machines using Microsoft's Windows operating system, the software that runs most computers.

It can infect machines via a net connection or by hiding on USB memory drives used to ferry data from one computer to another. Once in a computer, it digs deeps, setting up defences making it hard to extract.

ΘΥγΙ
Microsoft put up $250,000 to catch those behind Conficker

Among those affected by the virus have been the House of Commons and the defence forces of the UK, Germany and France.

The reason for the hype and the concern around Conficker is that 1 April was the day the worm was set to change the way it updates itself, moving to a system that is much harder to combat.

Five months ago a consortium of web security firms banded together to form the Conficker Working Group, to learn more about the worm and to try to stop it.

Last weekend the team located what they call a "fingerprint" or "signature" for the virus that means they can detect how an infected machine can be identified on a network much quicker than previously.

Security researcher Dan Kaminsky, a member of the group and director of penetration testing at IOActive, told the BBC this was a major breakthrough.

"We know these bad guys are in places they really shouldn't be. With this new trick it is much easier to find them. It means we can say, OK, I don't know what will happen but I can tell you 10,000 systems are under the control of the bad guys and here they are."

Lucrative

While no-one in the industry is 100% sure of the aim of Conficker, they are positive the people behind it are more concerned about making money than causing mayhem.

A recent report by security firm Finjan claimed that cybercrime is as lucrative a business as drug trafficking.

Its Cybercrime Intelligence Report found that a single hacker could make as much as $10,800 (£7,300) a day, which the company extrapolated to $3.9m (£2.6m) a year.

Finjan's chief technology officer Yuval Ben-Itzhak said: "Cybercrime today is a very, very big business and those behind Conficker have spent a lot of money organising, writing code and securing these machines so they will be looking for a return soon.

"This type of cybercrime activity is here to stay and will grow because there is so much money involved and its hard to get caught."

Help identify

In February Microsoft put up a bounty of $250,000 to anyone who could help identify those behind Conficker. It also issued patches to address the vulnerability.

Industry experts say consumers and companies should regularly update their security software and apply Windows updates as well as protect computers and files with strong passwords.

Can of worms (EyeWire)
Conficker is an aggressive worm that has crawled into millions of machines

Symantec has issued a free trial version of its products that will detect and remove the worm.

VeriSign, one of the guardians of the networked world, believes these bugs exist because the general level of security is just not high enough.

"This is a testament to making consumer products useable and user friendly, which means security has to be relaxed a little," said VeriSign's chief technology officer Ken Silva.

"If all the security measures were deployed that should be deployed, they would become too annoying and too difficult for most consumers."



Print Sponsor


SEE ALSO
Security experts eye worm attack
31 Mar 09 |  Technology
Timeline: The Conficker worm
31 Mar 09 |  Technology
Q&A: Conficker protection
31 Mar 09 |  Technology
Microsoft bounty for worm creator
13 Feb 09 |  Technology
Holes in the machine
16 Mar 09 |  Technology
Windows worm trickery for Vista
21 Jan 09 |  Technology
Clock ticking on worm attack code
20 Jan 09 |  Technology
A glimpse inside the virus writer
05 Nov 03 |  Technology
The spies watching while you type
17 Mar 05 |  Technology
Spam reaches 30-year anniversary
02 May 08 |  Technology

RELATED INTERNET LINKS
The BBC is not responsible for the content of external internet sites


FEATURES, VIEWS, ANALYSIS
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit

PRODUCTS & SERVICES

Americas Africa Europe Middle East South Asia Asia Pacific