M*crosoft Offers $250,000 Bounty For Worm Authors
The company has formed a cybersecurity posse with technology companies, academic organizations, and Internet infrastructure firms to dismantle the Conficker/Downandup worm’s infrastructure.
By Thomas Claburn, InformationWeek
Feb. 12, 2009
Beset by malicious worms after failing to convince enough server administrators to take its out-of-band Security Bulletin, MS08-067, seriously, M*crosoft is taking computer security to the streets: It has formed a cybersecurity posse to dismantle the Conficker/Downandup worm’s infrastructure and has offered a $250,000 reward for information leading to the arrest and conviction of those responsible for the outbreak.
M*crosoft warned last October that a vulnerability in its Server service could be exploited by a worm. Cybercriminals heard that warning and made the threat real, infecting as many as 9 million computers by mid-January. At that time, Wolfgang Kandek, CTO of Qualys, estimated that between 25% and 30% of vulnerable systems remained unpatched.
And the problem continues more or less unabated today. Symantec said in the past five days it had seen an average of almost 500,000 infections per day with W32.Downadup.A and over 1.7 million infections per day with W32.Downadup.B.
Jose Nazario, manager of security research for Arbor Networks, in a blog post on Thursday, called Conficker/Downandup a “savage Windows worm.”
The total number of machines infected at any given time varies as a consequence of disinfection efforts. But rest assured that the number represents a very large botnet.
So it is that on Thursday, M*crosoft announced a partnership with technology companies, academic organizations, and Internet infrastructure companies to fight the worm in the wild. Its partners in this worm hunt include: ICANN, Neustar, VeriSign, CNNIC, Afilias, Public Internet Registry, Global Domains International, M1D Global, AOL, Symantec, F-Secure, ISC, researchers from Georgia Tech, Shadowserver Foundation, Arbor Networks, and Support Intelligence.
Together, the coalition is working to seize Internet domains associated with the worm.
“The best way to defeat potential botnets like Conficker/Downadup is by the security and domain name system communities working together,” said Greg Rattray, ICANN chief Internet security advisor, in a statement. “ICANN represents a community that’s all about coordinating those kinds of efforts to keep the Internet globally secure and stable.”
In a phone interview, Kevin Haley, director of security response at Symantec, said that there had been a lot of independent efforts to deal with the worm. The time was right, he said, to tackle it as a community.
According to Symantec, researchers have reverse-engineered the algorithm used to generate a daily list of 250 domains that the worm depends on to download updates. Armed with that knowledge, the coalition is taking control of the domains registered through coalition partners and using them to log and track infected systems. The group is also investigating domains overseen by registrars that are not part of the coalition, though it’s not clear how much leverage can be applied in such cases.
The worm won’t be entirely stopped by such tactics: it also includes a peer-to-peer update mechanism. But it’s a start.
Perhaps in recognition of the difficulty of getting help from registrars outside the coalition, particularly in countries with a tradition of tolerance for cybercrime, M*crosoft said that residents of any country are eligible for its $250,000 reward. In many parts of the world, that kind of money will buy just about anything.
The last time the security community acted in unison like this was during the spring and summer of 2008, when several dozen companies and organizations came together to deal with the DNS vulnerability identified by security researcher Dan Kaminsky. But that was a bug fix rather than a worm hunting posse.
Haley doesn’t expect this sort of community policing of the Internet to happen more frequently; nor would he rule out further actions of this sort. “The groups that stepped in filled a void,” he said. “As long as this is effective, we’ll continue to look for opportunities.”