Kamis, 16 April 2009

Computer experts brace for “Conficker” worm (Part 2)

“It’s not time to hide in the bunker. But it might be prudent to look out the window,” he added.

In February, Microsoft announced it was offering a $250,000 reward for information leading to the arrest and conviction of whoever is responsible for creating Conficker, saying the worm constituted a “criminal attack.”

FEARS OF ID THEFT

Botnets are a major worry because they can surreptitiously steal identities, log sensitive corporate information, credit card numbers, online banking passwords or other key data users of infected PCs type on their keyboards.

The information is often sold to criminal rings.

“Most malware we see in this day and age is very concerned with stealing information and making money for the author,” said Dave Marcus, a researcher with security-software maker McAfee Inc’s Avert Labs.

Experts said Conficker’s authors might gradually change the way it communicates to avoid attention and to prevent companies from putting in place safeguards such as those used to fight the worm since it first surfaced last year.

Microsoft released a patch to protect against the worm late last year, while anti-virus software companies offer software to sniff it out and destroy it. Such tools can be expensive.
Technology research firm Gartner Inc estimates businesses will spend $13.6 billion on security software this year excluding costs for related labor, services and hardware. While some consumer anti-virus software packages are available for free, others run as high as $80 each.

Security experts suspect Conficker originated in the Ukraine, based on its code. The FBI is working to shut it down but a spokesman declined to comment on its investigation.

“The public is once again reminded to employ strong security measures on their computers,” said Shawn Henry, assistant director of the Federal Bureau of Investigation’s cybercrimes division.

Independent security firms such as McAfee, Symantec Corp and Trend Micro Inc say they will closely monitor cyberspace on Wednesday to see how the worm mutates but will also watch closely over coming weeks as the hype fades.

“I don’t expect much to happen on April 1st. That’s the one day I would not do it. That’s the one day everybody is watching for something to drop,” said Joe Stewart, director of malware research at SecureWorks. “It’s just another small step in whatever the end game is.”

(Reporting by Jim Finkle; Editing by Jason Szep, Gary Hill)

source :technologyonlinenews.com

0 komentar: