ICANN Continues Collaborative Response to Conficker Worm

by Greg Rattray on March 28, 2009

The Conficker worm that has infected hosts across the Internet continues to evolve. At this point, we do not believe cause exists for general alarm, but the Internet community must continue to take action against Conficker. ICANN continues to engage in collaborative efforts with security researchers, software & anti-virus vendors and with registries and registrars throughout the DNS community to disseminate information about how the malicious code may seek to leverage the DNS system.

The initial variants of the worm, Conficker A/B, focused on potentially utilizing a limited number of domain names to control the infected computers. The affected registrars have collaborated to block the control of this variant of the worm over the past two months. A new variant, Conficker C, has been identified. This variant is more complex and presents increased mitigation challenges. Among these challenges, Conficker C seeks to use a wider range of domain names across the DNS, involving many more names in across a greater number of registries. Analysis indicates the Conficker C code will become active on April 1st.

ICANN is working with the security, vendor and DNS communities in an effort to proactively inform those involved registries who might be affected with specific information that will enable them to block the use of the DNS to control the infected computers. Through the outreach, the registry community is now in close contact with the Conficker working group and taking actions appropriate to their particular situations. An important note regarding April 1st: While the Conficker C code may become active on this date, the DNS and the Internet will likely not see a sudden wave of disruption or activity from the infected computers. Lack of activity on April 1st does not mean the millions of infected computers have been cleaned up or that efforts to mitigate the control of these computers can stop.

The cooperation to stop the spread of the Conficker worm and block control of the infected computers has become a major effort involving well over 100 organizations. The collaborative has conducted shared technical analysis and passed information resulting in practical, proactive steps to limit control and stop the spread of the worm. ICANN will continue its efforts with the security and DNS communities and sees this effort as a model for effective global response to situations that challenge the security and stability of the Internet and the DNS. We also want to encourage individuals and organizations who are concerned about removing the malicious code and to contribute to disabling Conficker to visit http://confickerworkinggroup.org/wiki/ for information regarding what can be done.

{ 3 comments… read them below or add one }

Steve Conte 03.28.09 at 10:18 am

There’s also a good Q&A about conficker that F-Secure has posted today that some may find interesting. You can find it at:

http://www.f-secure.com/weblog/archives/00001636.html

Steve

reshma 08.12.09 at 2:28 pm

Coflicker worm is really security threat for business world and has affected millions of PCs. We have to be alerted for these kind of viruses.
Locksmiths

KELECHI OKORIE 07.11.10 at 11:26 am

There have been fears over here that it is the same experts that look for solution for these visuses that also writes them. This is actually an issue ICANN should address in the near future. Conspiracy theories when left for a long time, become viral. such conpiracies abound that the delay in finding solutions to the dreaded Conficker worm is deliberate.

Leave a Comment

You can use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

*
To prove you're a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.
Anti-spam image