The Conficker worm continues to be a threat and businesses need to be aware of two vulnerabilities it may have introduced to their IT systems, says an industry group set up to combat the malware.
Conficker typically disables the automatic updates for the Microsoft Windows operating system and turns of traditional anti-virus, but few business organisations are aware of this," Rodney Joffe, director of the Conficker Working Group, told Computer Weekly.
Criminals can identify all IP addresses infected by the Conficker worm and the date infection occurred, he said.
From this information, they will know the vulnerabilities of these IP addresses. They are likely to be vulnerable to because they have not received Microsoft security updates from the date of infection and have probably had all AV systems disabled, said Rodney Joffe.
Once a potentially vulnerable IP address is known, criminals can use reverse-mapping technology to identify the organisation that IP address belongs to. Criminals can then use the IP address as a way of launching attacks on other machines behind the organisation's firewall, he said.
Just because there have been no big attacks linked to Conficker since April 2009, it is dangerous to assume that nothing is happening, said Joffe.
It would be stupid for criminals not to use Conficker and it is possible the machines dropping off the Conficker Working Group's regular scans are being sold to others to use as potential targets because most machines infected with Conficker are likely to be susceptible to other attack methods, he said.
The only way organisations can be sure they are not vulnerable is to contact one of the members of the Conficker Working Group to check whether their IP addresses are being picked up in the organisation's scans, said Joffe. Organisations can do this free of charge.
Businesses and other organisations can also use standalone disinfection tools and check their firewall logs to see if any of the machines within their network have attempted to make any unauthorised connections to Conficker command and control centres, he said.
Only through a concerted effort using this approach has the US Federal network been able to reduce the number of infected machines from thousands to below 50, said Joffe.