Researchers find new variant of Conficker worm

Researchers think that the new variant may be trying to get around attempts by the industry to bring it down.

Researchers have revealed the techniques that the Conficker worm uses to spread so rapidly, as well as information on a new variant of the most serious Conficker B strain.

SRI International researchers published details of the new code they called Conficker B++, which they said could signal a shift in the strategies used by Conficker's authors.

The report said Conficker B++ had the potential to bypass attempts by the Conficker Cabal' to keep the Conficker B worm under control by cracking the algorithm the worm uses to look for new code in different domains.

The Conficker Cabal is a broad industry alliance brought together by Microsoft, which is responsible for efforts to stem the growth of the worm.

Bruce Schneier, chief technology officer for BT, also wrote on his blog about one of the biggest main reasons Conficker has grown to the size it has, which was IT administrators using easy-to guess passwords.

He said that most people didn't choose passwords that remained secure against modern password-guessing attacks. He also said that Conficker B wasn't actually very clever in only using 200 common passwords to break into a network.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021