New variant of Conficker strikes

New Conficker variant talks to servers associated with the Waledac botnet, and downloads an ‘unknown’ payload.

Security researchers have discovered a new variant of Conficker, which has downloaded a payload from servers connected to the Waledac botnet.

A week after the April Fool's Conficker scare, a dropper' came through which updated Conficker and added new functionality through its P2P connectivity.

The new Conficker variant was also talking to servers and websites that were already known for their associations with the Waledac family of malware.

Trend Micro said in an interview with eWeek it had already downloaded a further component that it was currently analysing, but had some "rootkit capabilities".

Trend Micro security expert Rik Ferguson said it could be the payload which could finally monetise the botnet: "These components have so far been missing, but could this finally be the other boot dropping' that we have all been been waiting for?"

Waledac is a spambot that steals sensitive information and turns computers into spam zombies.

It was suspected to be the latest threat from the people behind Storm, which could mean that the same cybercriminals were behind all three threats.

Ferguson said to IT PRO: "It tallies with some of the assumptions people have made about Conficker that the first variant was actively trying to avoid Ukraine because Waledac was Eastern European."

The worm also re-enabled propagation functionality which had previously been disabled on previous versions.

By connecting to one of myspace.com, msn.com, ebay.com and cnn.com, the worm helped establish whether a computer was internet connected or whether it could only infect a local network.

Users were warned not to be alarmed, and to continue to exercise caution and implement security best practices such as keeping patches current and antivirus definitions up to date.

More on the Conficker threat is here, while the worm threat of 2009 has also been looked at.

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

What is a botnet?
botnets

What is a botnet?

14 Jul 2021
Trend Micro home network security flaws could let hackers take over PCs
Security

Trend Micro home network security flaws could let hackers take over PCs

26 May 2021
The secure cloud configuration imperative
Whitepaper

The secure cloud configuration imperative

26 May 2021
Trend Micro and Snyk team up to combat open source flaws
vulnerability

Trend Micro and Snyk team up to combat open source flaws

10 May 2021

Most Popular

What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Google takes down map showing homes of 111,000 Guntrader customers
data breaches

Google takes down map showing homes of 111,000 Guntrader customers

2 Sep 2021
Intuit plans end-to-end SMB platform after $12 billion Mailchimp acquisition
mergers and acquisitions

Intuit plans end-to-end SMB platform after $12 billion Mailchimp acquisition

14 Sep 2021