Mikko posted earlier about how the domain generation algorithm in Conficker works. Just to make it clear to everyone – this has now started.
Infected computers use the local time as the trigger to start generating the list of 50,000 domains, so in places where the local time is already April 1st, these computers are now actively polling for domains.
And, until the GMT date is April 1st they are in fact polling for domains for 31st March. So far there hasn't been any updates available on those sites.
In summary: Conficker has activated. So far nothing has actually happened.
As I'm posting this, it's 00:18 on the 1st of April in Auckland, New Zealand.
But there aren't that many Conficker infections in New Zealand to begin with.
Infection situation in South Korea is more interesting; it's in the TOP 5 infected countries. And it's already 20:18 on the 31st in Seoul right now.
So, when exactly is Conficker activating?
It goes like this:
Conficker checks the local clock every 90 minutes (in some cases even more frequently)
The check is done with Windows GetLocalTime function
GetLocalTime gives the local time, based on the local time zone
Because of this, machines around the world are returning different times
Clock skew affects this as well
But not by much, as Windows machines will sync their local clock with time.windows.com once a week
Once the local clock says it's April 1st, Conficker will collect a date from the net
This means that machines in Australia will already be collecting a date from the net when machines in Hawaii aren't.
Conficker's net time collection uses several large websites to get the date. These are sites such as:
The HTTP header time on these sites is very accurate and very close to each other.
You can check these yourself: simply connect to port 80 of any website with netcat or telnet. In Windows, simply run "telnet google.com 80". Once connected, type (blindly) "GET /" and hit enter a couple of times. You'll get a screenful of results, including a "Date:" field.
Here's some sample HTTP HEAD returns from websites that Conficker uses to check the date. These were checked earlier this morning:
Google.com Date: Tue, 31 Mar 2009 06:27:42 GMT Client-Date: Tue, 31 Mar 2009 06:27:42 GMT Client-Peer: 126.96.36.199:80
www.baidu.com Date: Tue, 31 Mar 2009 06:31:47 GMT Expires: Tue, 31 Mar 2009 06:31:47 GMT Client-Date: Tue, 31 Mar 2009 06:31:48 GMT Client-Peer: 188.8.131.52:80
www.youtube.com Date: Tue, 31 Mar 2009 06:32:30 GMT Expires: Tue, 27 Apr 1971 19:44:06 EST Client-Date: Tue, 31 Mar 2009 06:32:31 GMT Client-Peer: 184.108.40.206:80
When the local clock says it's April 1st, Conficker will fetch the date values from the above sites and will use these values in an algorithm to generate 50,000 unique domain names. Do note that even if the date from the web sites says it's March 31st, Conficker would still activate if the local clock says it's April 1st.
The machines that are infected by Conficker.C and are turned on, will change modes between 00:00 and 01:30 on April 1st, based on machines own clock. The ones that are turned off, will change modes soon after they are booted up.
This is a fake video site that serves a fake Adobe Flash Player update for Macs, supposedly to watch a video.
Anyway, when mounted the DMG file has a package file named "install.pkg". Here's the snapshot of what you get when you open the package:
The "install.pkg" file contains the following files:
We extracted the "Archive.pax.gz" which contains the following files:
We analyzed each file and found that "AdobeFlash", "preinstall" and "preupgrade" are all the same thing, which is actually an obfuscated bash script:
So here's the de-obfuscated script:
Based on the above code, the script searches for the string "AdobeFlash" in the Schedule Jobs list; if the string doesn't exist, the script creates the following Schedule Job to run the "AdobeFlash" file every 5 hours.
As you're all aware Conficker has been in the news a lot lately, especially with regards to if anything will happen on April 1st or not. We found out that rogue security software folks have picked up on this. For example, let's have a look at remove-conficker.org, a domain which was registered today:
They advertise a tool called MalwareRemovalBot. It's fake. Interestingly, it doesn't always find non-existing malware infections on your PC — only sometimes. But one thing is for sure, it does not remove Conficker.C. We tried it and it didn't do a thing to remove it.
When it did find something that it claimed to be malware it looked like this:
And then it asked us to register and pay $39.95 for the removal functionality.
When following up on this we did a Google search for "remove conficker.c" and saw several purchased ads that lead to the same type of "security" software as well.
Like AdwareAlert and AntiSpy2009, it is clear that it's an affiliate program going on.
Get your facts from known sites and download your removal tools from respected companies. Such as ours which you can find here.
The GhostNet spy network was built by infecting sensitive computers with backdoor/Remote Administration Tools (RAT). Most of these are modified and obfuscated versions of Poison Ivy (description) or Gh0st RAT.
These tools are open source backdoors, maintained by loose gangs of hackers.
And these gangs operate openly.
Here's the website for Poison Ivy:
With a nice collection of screenshots:
And the gang behind Gh0st RAT is known as C.Rufus aka Wolfexp:
Some quotes from the above page:
• "Our†desire for success is like wolf's desire for blood..." • "We work together against the enemy like a pack of wolves…"
Wolfexp website also feature a demo video on how to use Gh0st RAT to take over computers:
Amazingly, the video ends by showing 10 live webcam sessions, snooping on unsuspected victims without their knowledge.
On a related note, see this CNN video which interviews of the Chinese underground in 2008. Some of the hackers claim that they were paid by the Chinese government.
The University of Toronto published today a great research paper on targeted attacks.
We've talked about targeted attacks for years. These cases usually go like this:
1. You receive a spoofed e-mail with an attachment 2. The e-mail appears to come from someone you know 3. The contents make sense and talk about real things (and in your language) 4. The attachment is a PDF, DOC, PPT or XLS 5. When you open up the attachment, you get a document on your screen that makes sense 6. But you also get exploited at the same time 7. The exploit drops a hidden remote access trojan, typically a Poison Ivy or Gh0st Rat variant 8. No one else got the e-mail but you 9. You work for a government, a defense contractor or an NGO
But the real news is that Greg Walton & co actually managed to get an inside view of some of the servers used in these spying attacks. This means they got to see what was being done with the infected machines and where in the world they were.
Click the image above to read John Markoff's article.
The release of the paper was synchronized with the New York Times article. University of Cambridge released a related research paper at the same time as well. The Cambridge paper goes all the way to point the finger directly at the Chinese Government. Most other parties, us included, have not done such direct accusations without concrete proof of government involvement.
For a reason or another, infowar-monitor.net has been down all day. So we've made a mirror of the research papers available here:
More resources: Here's a video that we posted earlier about targeted attacks:
Q: I heard something really bad is going to happen on the Internet on April 1st! Will it? A: No, not really.
Q: Seriously, the Conficker worm is going to do something bad on April 1st, right? A: The Conficker aka Downadup worm is going to change it's operation a bit, but that's unlikely to cause anything visible on April 1st.
Q: So, what will it do on April 1st? A: So far, Conficker has been polling 250 different domain names every day to download and run an update program. On April 1st, the latest version of Conficker will start to poll 500 out of 50,000 domains a day to do the same thing.
Q: The latest version? There are different versions out there? A: Yes, and the latest version is not the most common. Most of the infected machines are infected with the B variant, which became widespread in early January. With B variant, nothing happens on April 1st.
Q: I just checked, and my Windows machine is clean. Is something going to happen to me on April 1st? A: No.
Q: I'm running a Mac, is something going to happen to me? A: No.
Q: So… this means that the attackers could use this download channel to run any program on all the machines? A: On all the machines that are infected with the latest version of the worm, yes.
Q: But what's this peer-to-peer functionality I've heard about? A: The worm has some peer-to-peer functionality which means that infected computers can communicate with each other without the need for a server. This enables the worm to update itself without the need for any of the 250 or 50,000 domains.
Q: But doesn't that mean that if the bad guys wanted to run something on those machines, they don't need to wait for April 1st? A: Yes! Which is another reason why it's unlikely anything major will happen on April 1st.
Q: Is there going to be media hype? A: Oh yes. Like there always is when a widespread worm has a date trigger. Think cases like Michelangelo (1992), CIH (1999), Sobig (2003), Mydoom (2004) and Blackworm (2006).
Q: But in those cases nothing much happened even though everybody expected something to happen! A: Exactly.
Q: So, should I keep my PC shut down on April 1st? A: No. You should make sure it's clean before April 1st.
Q: Can I change the date on my machine to protect me? A: No. While the worm uses the local system time for certain parts of its update functionality it doesn't exclusively rely on that.
Q: I'm confused. How can you know beforehand that there will be a global virus attack on April 1st? There must be a conspiracy here! A: Yes, you're confused. There is not going to be a "global virus attack". The machines that are already infected might do something new on April 1st. We know this because we have reverse engineered the worm code and can see that this is what it has been programmed to do.
Q: Would the downloaded program execute with admin privileges? A: Yes, with local admin rights. Which is pretty bad.
Q: And they could download that program not just on April 1st but also on any day after that? A: Correct. So there's no reason why they wouldn't do it on, say, April 5th instead of April 1st.
Q: Ok, they could run any program. To do what? A:We don't know what they are planning to do, if anything. Of course, they could steal your data, send spam, do DDoS, et cetera. But we don't know.
Q:They? Who are they? Who's behind this worm? A: We don't know that either. But they seem to be pretty professional in what they do.
Q: Professional? Is it true that Conficker is using the MD6 hash algorithm? A: Yes. This was probably one of the first real-world cases where this new algorithm was used.
Q: Why can't you just infect a PC, set the clock to April 1st and see what happens? A: That's not the way it works. The worm connects to certain websites to get the time-of-day.
Q: Oh yeah? Then shut down the websites where it gets the time-of-day and the problem will go away! A: Can't. These are websites like google.com, yahoo.com and facebook.com.
Q: But surely you could spoof google.com in the lab to get a honeypot machine to connect to a download site today! A: Sure. And the download sites do not have anything to download, today. They might, on April 1st. Or they might not.
Q: Now I'm worried. How do I know if I'm infected? A: Try to surf to www.f-secure.com. If you can't reach our website you might be infected, as Downadup/Conficker blocks access to security vendor's websites. Don't tell anybody, but users who can't access f-secure.com because of this can surf to www.fsecure.com instead.
Q: Where does the name "Conficker" come from? A: Conficker is an anagram of sorts from trafficconverter – a website to which the first variant was connecting.
Q: Why does the worm have two names – Downadup and Conficker? A: It was found at about the same time by multiple security companies and therefore got multiple names. Today most companies use the name Conficker. There's further confusion about the variant letters among vendors. We're all sorry for that.
Q: How many computers are currently infected by Downadup/Conficker? A: About 1-2 million. How many of those are infected with the latest version? We don't have an exact count.
Q: How is the industry reacting to all this? A: We reacted by setting up the Conficker Working Group. Members include security vendors (including us), registrars, research units and so on.
Q: Is this all just an April Fools joke? A: No, it's not. And although we don't think anything will happen on this particular date, Conficker is nothing to laugh about. The gang behind this is serious and we should not underestimate them. The fact that we don't know for real what they are really after just makes it all a bigger mystery.
Q: Is F-Secure able to detect and block this malware? A: Yes.
Q: Do you have cleaning tool available? A: Yes, and it's free. Click here to get it.
Q: Are you going to follow this through? A: Yes. Stay tuned for updates.
Our tests demonstrated adtronic to be a well behaving application that did exactly what it said it would.
The user interface was easy to locate, the instructions to set the minimum/maximum limits were clear, and the ads themselves weren't actually all that intrusive. Downloading the ad banners requires a data connection and that is clearly stated. It was also easy to uninstall when we were done testing.
Combined with a set of free applications that people really want, this could be a successful business model. Success interests us because a money making business model will be noticed by eCrime.
Advertising revenue is the target of many DNSChanger PC malware families.
Also, while there are still some good Windows based ad supported applications, there are many more that crossover into adware and spyware.
We recently received reports of a file named "ActiveXsetup.exe", which was downloaded from http://world-tube .biz.
For people that want to play the video, there's a notice written on the page on red font that "You may need to download an ActiveX video codec (VAC)…". This old trick is well-known and commonly used by other malware.
Remember the Facebook site that attempts to trick people into downloading and executing a fake Adobe Flash Player?
Still, what happens when an unsuspecting user downloads the "ActiveXsetup.exe codec", thinking it is legitimate software? Hereís the snapshot of it, as it is executed:
The file is a NSIS setup file, with a "Playme.exe" file inside the archive. Turns out the setup file is detected as Trojan:W32/TDSS.BR, while the Playme file is detected as Worm:W32/TDSS.BU.
So, more video sites serving malware. Watch out for these sites and stick to the trusted ones.
Twitter.com is really slow today, most likely due to spammers using it to flood the system with messages such as this:
I created a new dummy account to test this and literally within seconds of signing up I had two followers.
One was DowningStreet which is the official Twitter account for the guy who runs the UK. The other follower was Kristen Andrews. If we take a look at her Twitter page we see a link:
The link goes to… a Casino site!
This page asks you to download the file goldencasino.exe which is a Casino game.
My "follower" Kristen's account was deleted within 10 minutes so it seems as Twitter is aware of the problem.
But let's follow the link from the first screenshot to really see what these scams are about. Who doesn't want a free Range Rover? Clicking on the link takes us to a page talking about how we can make $5000 USD per month. What happened to my free Range Rover!?
It still sounds like a good deal so let's go on. Clicking on any of the links takes us to (after a redirect via krovs.com) to onlinewizards.net where it says we can now make $6500 per month.
This is getting better and better. So let's sign up.
So this is what it's really about, they want my credit card info and my personal details. Stay away from it.
One of the more notorious pay-per-install programs, Trafficconverter has been taken down today.
These sites work like this:
1. Trafficconverter develops a "rogue" antivirus product 2. The product will find viruses even on clean systems 3. It won't "clean" those viruses unless you register the product 4. Trafficconverter does not market their software at all 5. Instead, all the marketing is done through affiliates 6. Affiliates have existing botnets of thousands of infected computers 7. They remotely install these rogue products to those computers 8. Confused end users see warning messages about viruses on their screens 9. …and register the rogue product for $50 to "fix" their machine 10. Affiliates get $30 per customer, Trafficconverter get $20 11. ??? 12. PROFIT!
So, it's good to see these guys going offline.
Here's the front page of trafficconverter2.biz yesterday:
Just a quick note on a new spam run that's going on. It's from the same group that used Bank Of America as the lure late last week and Northern Bank on Monday.
Today it's Comcast and it might actually have a higher success rate then the previous run as users always want faster broadband, especially if there's no fee involved. And the page looks really convincing.
Once installed the malware does the same as in the other spam runs - steals data and sends it to Hong Kong.
Click on the picture for a full page screen shot
Update: The spam run was just changed to a Facebook scheme.
Some subjects are:
FaceBook message: Magnificent girl dancing video clip (Last rated by Sal Velasquez) FaceBook message: Dancing Girl Drunk In The Pub- facebook Video (Last rated by Abe Bain) FaceBook message: Hot Girl Dancing At Striptease Dance Party (Last rated by Lowell Clay) FaceBook message: Dancing Girl Drunk In The Pub- facebook Video (Last rated by Shane Lucas)
Christopher Boyd of FaceTime Security Labs wrote an interesting post regarding YouTube videos that promote Nintendo Wii Points Generators. They're a scam of course… and greedy victims attempting to steal Wii Points will get a malicious backdoor called Bifrose for their trouble.
Checking out some of the videos for ourselves, we discovered that the video information sections contained a link to a RapidShare download called Generator.exe. That's a trojan-dropper that installs the Bifrose backdoor.
There are a number of such Wii scams on YouTube, and for several months too.
At the top of the list is itunesGenerator, age 18:
His Wii Points video has almost 36,000 views.
And his channel has 252 Subscribers??? We thought that was interesting.
Who are these people? Fake accounts to support his feedback? Or affiliates that have purchased backdoor access?
And here's a selection of his "positive" feedback:
Of course the comments are moderated. Do you think our comment will be approved?
No — Not very likely.
We flagged the video with YouTube, but as Mikko's post from last week shows, YouTube doesn't really have an exact match for this type of scam. You can flag videos for visual content promoting physical bodily harm, but it's more difficult to warn of content with harmful consequences to your computer, should you follow its advice.
Update: Searching for XBox Points Generator and iTunes Gift Cards also leads to malware and phishing sites.
We hope this is something that YouTube acts on soon.
The type of spam runs we saw late last year (Obama and BofA) are starting to pick up again in volume. We've seen Classmates being used as a theme and two days ago it was fake Facebook messages. Today it's back to fake Bank of America certificates.
As in all previous spam runs it leads to a site prompting you to download a fake Adobe Flash player. This malware steals confidential information and sends it to a web server. In previous attacks this server was in the Ukraine but it has now been moved to Hong Kong. If you see network traffic to the IP address 220.127.116.11, it's a bad sign.
Version 2.0.0 is now available; its beta piloting project has just started. Online Backup makes it possible to back up your important data — photos, e-mails, documents and so forth — over the Internet to secure backup servers. Because you know that it's not a matter of if your hard drive fails, but when.
It also allows you to share items with friends via the Internet.
We're now releasing the Windows version for beta piloting. A bit later a brand new Mac version will also be made available.
We have a limited number of beta licenses to give out so if you want to try it out, act now! Once the licenses are given out, the beta program will close. You can join it at this address:
Do note that while we are recommending users move away from Adobe Reader, we are not recommending any particular replacement.
So, we're not recommending Foxit. We're not recommending Sumatra. Or PDF-Xchange, CoolPDF or eXPert PDF.
Instead, we recommend users to find their own Adobe Reader replacement.
This way we get more heterogeneous userbase, which is a good idea security-wise. Nobody wants to repeat what happened with the great IE —> Firefox switch. As 40% of users switched to Firefox, about 40% of the attacks switched to target Firefox.
Only a short post today — it's been very busy lately…
Do you like our blog? If you do, consider nominating us for the first annual Social Security Awards.
Held in conjunction with the Security Bloggers Meet-Up at RSA Conference 2009, the Social Security Awards give readers a chance to recognize the best, brightest, and most entertaining bloggers and podcasters in the field.
Let's take a look at another kind of content that's more or less available on the Internet — Pornography.
How to find it? How to detect it?
How to tell "good pornography" from "bad pornography". Odd question, right?
Good is safe for your credit card, and is legally produced. Bad equals people who want to steal your money, abuse children or have other illegal intentions.
Why do we bring this up?
Our Security Research Lab has a team dedicated to technology that identifies and classifies the content of websites. This technology is the primary underlying element of our F-Secure Parental Control. We also do quite a bit of manual research.
We *suffer* so your kids don't.
In case you're interested in this line of work, we have a job opening.
"F-Secure Corporation is looking for a technically skilled individual to fill a position in Security Research. You will develop and track the quality and value of detection software, platform solutions and processes that enable the F-Secure Parental Control and other content related detection services."
Tyler Moore of Harvard and Richard Clayton of Cambridge have studied the usage of search engines in the compromise of Web servers in order to host fraudulent content, e.g. phishing sites.
"Although the use of evil searches has been known about anecdotally, this is the first paper to show how prevalent the technique has become, and to report upon the substantial rates of recompromise that currently occur."
Anecdotal evidence of multiple attacks?
Our May 21st, 2008 post is one such example. We've seen compromised sites becoming re-compromised for quite some time now.
Moore and Clayton's paper offers some fascinating analytics on the topic. They've found that compromised machines accounted for 75.8% of all the attacks analyzed. And 20% of the sites that were compromised were successfully attacked again within six months.
The paper is called Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing.