Main | Registration | Login Welcome! Guest| Private messages() |
Group "Guests" | RSS
Site menu
Our poll
Which giveaways?
Total of answers: 296
ShoutOut Box!
500
Main » 2009 » March » 26 » A Huge Virus Or Just a Joke?
A Huge Virus Or Just a Joke?
2:20 PM
There had been rumors on the web and the news that a huge Virus Worm is going to attack on April 1, 2009. Is it true or fake? We'll have to see then. When the worm attacks your computer, it could delete your data and spam your mail. Be cautious when checking e-mails and downloading things off from the web on that day. Don't open e-mails that are unfamiliar and don't download random things off the web.

Make sure to have a trustful and up to date Anti-Virus program running. It'll probably help a tiny bit. If you don't get free ones here.

Recommended Ones (If you are willing to pay):
Kaspersky
Norton
McAfee
PCTools

The following article is from Bits:

The Conficker worm is scheduled to activate on April 1, and the unanswered question is: Will it prove to be the world’s biggest April Fool’s joke or is it the information age equivalent of Herman Kahn’s legendary 1962 treatise about nuclear war, “Thinking About the Unthinkable”?

Conficker is a program that is spread by exploiting several weaknesses in Microsoft’s Windows operating system. Various versions of the software have spread widely around the globe since October, mostly outside the United States because there are more computers overseas running unpatched, pirated Windows. (The program does not infect Macintosh or Linux-based computers.)

An estimated 12 million or more machines have been infected. However, many have also been disinfected, so a precise census is difficult to obtain.

It is possible to detect and remove Conficker using commercial antivirus tools offered by many companies. However, the most recent version of the program has a significantly improved capacity to remove commercial antivirus software and to turn off Microsoft’s security update service. It can also block communications with Web services provided by security companies to update their products. It even systematically opens holes in firewalls in an effort to improve its communication with other infected computers.

Given the sophisticated nature of the worm, the question remains: What is the purpose of Conficker, which could possibly become the world’s most powerful parallel computer on April 1? That is when the worm will generate 50,000 domain names and systematically try to communicate with each one. The authors then only need to register one of the domain names in order to take control of the millions of zombie computers that have been created.

Speculation about Conficker’s purpose ranges from the benign — an April Fool’s Day prank — to far darker notions. One likely possibility is that the program will be used in the “rent-a-computer-crook” business, something that has been tried previously by the computer underground. Just like Amazon.com offers computing time on its network for rent, the Conficker team might rent access to its “network” for nefarious purposes like spamming.

The most intriguing clue about the purpose of Conficker lies in the intricate design of the peer-to-peer logic of the latest version of the program, which security researchers are still trying to completely decode.

According to a research addendum to be added Thursday to an earlier paper by researchers at SRI International, in the Conficker C version of the program, the infected computers can act both as clients and servers and share files in both directions. The peer-to-peer design is also highly distributed, making it more difficult for security teams to defeat the system by disabling so-called super-nodes.

Conficker’s authors could be planning to create a scheme like Freenet, the peer-to-peer system that was intended to make Internet censorship of documents impossible.

Or perhaps the Conficker botnet’s masters have something more Machiavellian in mind. One researcher, Stefan Savage, a computer scientist at the University of California at San Diego, has suggested the idea of a “Dark Google.” What if Conficker is intended to give the computer underworld the ability to search for data on all the infected computers around the globe and then sell the answers? Malware already does this on a focused basis using a variety of schemes that are referred to as “spear phishing,” in a reference to the widespread use of social engineering tricks on the Net.

But to do something like that on a huge scale? That would be a dragnet — and a genuine horror story.


Click here to be directed to the article's webpage.
Views: 768 | Added by: FireworksTutorial | Rating: 0.0/0
Total comments: 1
1 darkside1222  
1
Well on April 1st, The conficker worm did not activate on that date! So it was fake for now. The Conficker worm is still reloading itself by today!!! But April 1st, Conficker worm diden't work.

Only registered users can add comments.
[ Registration | Login ]
Login
Calendar
«  March 2009  »
Su Mo Tu We Th Fr Sa
1234567
891011121314
15161718192021
22232425262728
293031
Search
Featured
Site Buddies
  • YouTube Channel
  • FWTDownloads
  • xxterry1xx
  • rapmaster243
  • darkside1222
  • firstrush
  • Statistics

    Total online: 1
    Guests: 1
    Users: 0
    Copyright © 2025 FireworksTutorial
    Powered by uCoz