Safeguard Your PC Against the Downadup Worm
Downadup is downright nasty. And that's even before it does much more than just spread.
But as analysts argue about how the compromised computers will be used -- to build a massive, new botnet, perhaps -- or how much information hackers will steal from infected machines, users like you have a more immediate concern: "How do I keep my PC from joining the ranks of the hacked?"
That's a simple question. Unfortunately, because of this worm's flexibility, the answers aren't.
What's the worm again? Thanks to the lack of an industry-wide labeling system, the worm goes by more than one name. Some companies dub it "Downadup," others call it "Conficker."
No matter the name, it's the same threat.
When did Downadup first appear? Security companies warned of the worm in late November 2008; Symantec Corp. was one of the first to sound the alarm when it raised its ThreatCon security alert level on Nov. 21. Within a week, Microsoft had added its voice to the chorus as it acknowledged a significant uptick in attacks.
However, the worm only really took off about a week ago as newer variations struck users and resulted in millions of infections.
How does it spread? One of Downadup's most intriguing aspects, say security researchers, is its multi-pronged attack strategy: It can spread three different ways.
The one that's gotten the most attention exploits a vulnerability in Windows that Microsoft Corp. patched nearly four months ago. The bug, which is in a file-sharing service that's included in all versions of the OS, can be exploited remotely just by sending a malformed data packet to an unpatched PC.
But the worm can also spread by brute-force password attacks, and by copying itself to any removable USB-based devices such as flash drives and cameras. More on those two in a moment.
What machines are most vulnerable to Downadup attack? According to Microsoft, unpatched Windows 2000, Windows XP and Windows Server 2003 machines are at the greatest risk to exploits of the bug patched in October. That gibes with reports from security companies, which have highlighted the danger to PCs running Windows XP Service Pack 2 (SP2) and XP SP3. Not coincidentally, those versions account for the bulk of Windows' market share.
Unpatched Windows Vista and Server 2008 systems, meanwhile, are less likely to fall victim to attack since hackers must have authenticated access to the computer, or in other words, know the log-in username and password.
Any Windows-powered machines, however, can be compromised by the worm's password and USB attack strategies.
Microsoft offered the fix as a security patch to users of the Windows 7 "pre-beta," the version it gave developers in late October and early November. It then integrated the patch into Windows 7 before it launched the public beta on Jan. 10.
Okay, so how do I protect my PC? Because this thing is a triple-threat, you'll need to take more than one defensive measure.
First of all, if you haven't already done so, apply the October fix that Microsoft tagged as MS08-067. If you have Windows Update set to automatically download and install patches, you should be protected, but it never hurts to double-check. You can verify that the patch has been installed by bringing up Windows Update, then clicking "Review your update history" and looking for a security update labeled as "KB958644."
If you are only now installing the patch, you might want to take Microsoft's advice and also download and install the January edition of its free Malicious Software Removal Tool (MSRT), which was updated last week so that it can detect, and then delete, Downadup infections.
What's this about password attacks? Although most of the news about Downadup's spread has focused on its exploitation of a patched bug in Windows, the worm also propagates by trying to guess other machines' administrative passwords.
Once the worm penetrates a corporate network -- perhaps by infecting a single unpatched machine, say a laptop, that is later connected to that network -- it tries to break into other PCs, including those that have been patched with the October emergency fix.
"One of the ways in which the Conficker worm (also known as Confick or Downadup) uses to spread is to try and batter its way into ADMIN$ shares using a long list of different passwords," said Graham Cluley, a senior technology consultant at Sophos, in an entry to a company blog last Friday. Cluley included the list of passwords that Downadup tries, which range from the ubiquitous "password" and the moronic "secure" to the slightly-more-clever "letmein" and "nimda," or "admin" spelled backward.
Cluley urged users to steer clear of what he called "poorly-chosen passwords," while other security companies recommended that users not only pick stronger passwords but change them periodically as well.
Obviously, if you're using a password that's on the Downadup list, you should change it immediately.