A brief capsule summary: Conficker update traffic has been detected on various networks; it’s now switched into a more active update mode in which, instead of checking 250 domains for updated code, it is using a set of 50,000 domains of which it tries a randomly selected 500 per day. So far, it does not appear that the Conficker creators have put up any update for Conficker to retrieve. There’s still no clue as to what the update will do when delivered, and no indication yet of any active use of the botnet.
Meanwhile, IBM has cracked the work’s P2P communication and developed a way for ISPs to detect infected customer machines by listening in on their P2P traffic.
Tags:
no subject
Different owners, same bullshit.
no subject
no subject
I'm working on my own detection of the P2P traffic, and so far I havent seen any need to 'crack' it.
Half the stories pushed from IBM imply they've got access to the P2P messages (bullshit), not just that they can reasonably detect it (I can do that now, just from the information already available)
no subject
Kaminsky's work, implying their may be a sploit against conficker itself, was far more dangerous a public release than this ISS 'discovery'.
Still, if they publish complete technical details, I'll be prepared to eat my words.
no subject
no subject
no subject
ALl their press releases however seem to try and implicate they've "Cracked it and now have access to the content of all conficker's P2P traffic", which I call bullshit on.