The
malicious program, known as Conficker, Downadup, or Kido was first
discovered in October 2008. Although Microsoft released a patch, it has gone on
to infect 3.5m machines. Experts warn this figure could be far higher and say
users should have up-to-date anti-virus software and install Microsoft's
MS08-067 patch. According to Microsoft, the worm works by searching for a
Windows executable file called "services.exe" and then becomes part of that
code. It then copies itself into the Windows system folder as a random file of a
type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll,
and then modifies the Registry, which lists key Windows settings, to run the
infected dll file as a service. Once the worm is up and running, it creates an
HTTP server, resets a machine's System Restore point (making it far harder to
recover the infected system) and then downloads files from the hacker's web
site.
Most malware uses one of a handful of sites to download files from, making
them fairly easy to locate, target, and shut down. But Conficker does things
differently. Anti-virus firm F-Secure says that the worm uses a complicated
algorithm to generate hundreds of different domain names every day, such as
mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the
site used to download the hackers' files. On the face of it, tracing this one
site is almost impossible.