http://www.bostonherald.com/business/technology/general/view.bg?articleid=1162343&srvc=business&position=recent
+ Show Spoiler +
Computer security firms are sounding the alarm about a new “Conflicker” virus that makes network computers their “slaves.”
Some think the software worm could try to expand its potential reach tomorrow, April Fools’ Day, no joke.
“It’s definitely serious,” Kevin Haley, director of security response at Symantec, said of the virus thought to be embedded in millions of network computers across the globe.
Security people are closely monitoring the virus, which some have compared to a spy “sleeper cell” that’s simply sitting dormant in computers awaiting its command to cause mischief or even criminal activities, such as stealing bank account data.
Each day, the Conflicker virus, as it’s known, sends out messages to about 500 computer domain names, seeking orders for what to do. Tomorrow, it’s expected to expand that base of inquiries to 50,000.
“A lot of the fear is based on the fact that most people don’t know what it will do,” said Haley. “It’s the anticipation (of the unknown) that’s getting to people.”
But Craig Schmugar, a senior computer threat researcher at McAfee Inc., said the Conflicker threat is “significantly disproportionate” to the attention the virus is getting.
Millions of computers are routinely infected with other viruses, often ones that are potentially nastier than Conflicker.
“The Internet is still going to be around April 2,” said Schmugar.
Haley agreed that, because of precautions taken by security officials, most computers are safe from possible Conflicker infections and damage.
But he said Conflicker needs constant monitoring due to its mysterious tactics and goals.
Some think the software worm could try to expand its potential reach tomorrow, April Fools’ Day, no joke.
“It’s definitely serious,” Kevin Haley, director of security response at Symantec, said of the virus thought to be embedded in millions of network computers across the globe.
Security people are closely monitoring the virus, which some have compared to a spy “sleeper cell” that’s simply sitting dormant in computers awaiting its command to cause mischief or even criminal activities, such as stealing bank account data.
Each day, the Conflicker virus, as it’s known, sends out messages to about 500 computer domain names, seeking orders for what to do. Tomorrow, it’s expected to expand that base of inquiries to 50,000.
“A lot of the fear is based on the fact that most people don’t know what it will do,” said Haley. “It’s the anticipation (of the unknown) that’s getting to people.”
But Craig Schmugar, a senior computer threat researcher at McAfee Inc., said the Conflicker threat is “significantly disproportionate” to the attention the virus is getting.
Millions of computers are routinely infected with other viruses, often ones that are potentially nastier than Conflicker.
“The Internet is still going to be around April 2,” said Schmugar.
Haley agreed that, because of precautions taken by security officials, most computers are safe from possible Conflicker infections and damage.
But he said Conflicker needs constant monitoring due to its mysterious tactics and goals.
Im scurd. I've read some things about it, and ways to avoid it is to not make online transactions or money, because if you do get a conflicker virus, you could potentially lose that money, or something else.
:edit:
If you guys are as needy as I am right now, heres some sites that I have found to help me
http://onecare.live.com/site/en-us/default.htm (Basically a Scan on your computer, Windows only)
http://support.microsoft.com/kb/962007 (Symptoms of a Conflicker virus, computer editing to prevent it, or at least prevent the spread of it, and recover)
Sorry Mac users, Those websites only help people that use Windows
:edit: Physician, I meant to just say scans,
:edit: I'd rather be safe than sorry.
:edit:
http://tech.yahoo.com/blogs/null/132464;_ylt=Ak6jwkfS.et0rF90MX68mSjZn414
Update on news about the Conflicker Virus.
+ Show Spoiler +
Tomorrow -- April 1 -- is D-Day for Conficker, as whatever nasty payload it's packing is currently set to activate. What happens come midnight is a mystery: Will it turn the millions of infected computers into spam-sending zombie robots? Or will it start capturing everything you type -- passwords, credit card numbers, etc. -- and send that information back to its masters?
No one knows, but we'll probably find out soon.
Or not. As Slate notes, Conficker is scheduled to go "live" on April 1, but whoever's controlling it could choose not to wreak havoc but instead do absolutely nothing, waiting for a time when there's less heat. They can do this because the way Conficker is designed is extremely clever: Rather than containing a list of specific, static instructions, Conficker reaches out to the web to receive updated marching orders via a huge list of websites it creates. Conficker.C -- the latest bad boy -- will start checking 50,000 different semi-randomly-generated sites a day looking for instructions, so there's no way to shut down all of them. If just one of those sites goes live with legitimate instructions, Conficker keeps on trucking.
Conficker's a nasty little worm that takes serious efforts to bypass your security defenses, but you aren't without some tools in your arsenal to protect yourself.
Your first step should be the tools you already have: Windows Update, to make sure your computer is fully patched, and your current antivirus software, to make sure anything that slips through the cracks is caught.
But if Conficker's already on your machine, it may bypass certain subsystems and updating Windows and your antivirus at this point may not work. If you are worried about anything being amiss -- try booting into Safe Mode, which Conficker prevents, to check -- you should run a specialized tool to get rid of Conficker.
Microsoft offers a web-based scanner (note that some users have reported it crashed their machines; I had no trouble with it), so you might try one of these downloadable options instead: Symantec's Conficker (aka Downadup) tool, Trend Micro's Cleanup Engine, or Malwarebytes. Conficker may prevent your machine from accessing any of these websites, so you may have to download these tools from a known non-infected computer if you need them. Follow the instructions given on each site to run them successfully. (Also note: None of these tools should harm your computer if you don't have Conficker.)
As a final safety note, all users -- whether they're worried about an infection or know for sure they're clean -- are also wise to make a full data backup today.
What won't work? Turning your PC off tonight and back on on April 2 will not protect you from the worm (sorry to the dozens of people who wrote me asking if this would do the trick). Temporarily disconnecting your computer from the web won't help if the malware is already on your machine -- it will simply activate once you connect again. Changing the date on your PC will likely have no helpful effect, either. And yes, Macs are immune this time out. Follow the above instructions to detect and remove the worm.
No one knows, but we'll probably find out soon.
Or not. As Slate notes, Conficker is scheduled to go "live" on April 1, but whoever's controlling it could choose not to wreak havoc but instead do absolutely nothing, waiting for a time when there's less heat. They can do this because the way Conficker is designed is extremely clever: Rather than containing a list of specific, static instructions, Conficker reaches out to the web to receive updated marching orders via a huge list of websites it creates. Conficker.C -- the latest bad boy -- will start checking 50,000 different semi-randomly-generated sites a day looking for instructions, so there's no way to shut down all of them. If just one of those sites goes live with legitimate instructions, Conficker keeps on trucking.
Conficker's a nasty little worm that takes serious efforts to bypass your security defenses, but you aren't without some tools in your arsenal to protect yourself.
Your first step should be the tools you already have: Windows Update, to make sure your computer is fully patched, and your current antivirus software, to make sure anything that slips through the cracks is caught.
But if Conficker's already on your machine, it may bypass certain subsystems and updating Windows and your antivirus at this point may not work. If you are worried about anything being amiss -- try booting into Safe Mode, which Conficker prevents, to check -- you should run a specialized tool to get rid of Conficker.
Microsoft offers a web-based scanner (note that some users have reported it crashed their machines; I had no trouble with it), so you might try one of these downloadable options instead: Symantec's Conficker (aka Downadup) tool, Trend Micro's Cleanup Engine, or Malwarebytes. Conficker may prevent your machine from accessing any of these websites, so you may have to download these tools from a known non-infected computer if you need them. Follow the instructions given on each site to run them successfully. (Also note: None of these tools should harm your computer if you don't have Conficker.)
As a final safety note, all users -- whether they're worried about an infection or know for sure they're clean -- are also wise to make a full data backup today.
What won't work? Turning your PC off tonight and back on on April 2 will not protect you from the worm (sorry to the dozens of people who wrote me asking if this would do the trick). Temporarily disconnecting your computer from the web won't help if the malware is already on your machine -- it will simply activate once you connect again. Changing the date on your PC will likely have no helpful effect, either. And yes, Macs are immune this time out. Follow the above instructions to detect and remove the worm.