Friday, March 27, 2009

Conficker

You have to be impressed by the complexities of Conficker.  It used a three week old encryption algorithm (MD-6).  When Dr. Rivest’s group (creators of MD-6) submitted a revised version of the MD-6 algorithm, as a buffer overflow had been discovered in its implementation, Conflicker implemented the revised MD-6 algorithm.

Conficker Analysis

From this report:

"We must also acknowledge the multiple skill sets that are revealed within the evolving design and implementation of Conficker.  Those responsible for this outbreak have demonstrated Internet-wide programming skills, advanced cryptographic skills, custom dual-layer code packing and code obfuscation skills, and in-depth knowledge of Windows internals and security products.  They are among the first to introduce the Internet rendezvous point scheme, and have now integrated a sophisticated P2P protocol that does not require an embedded peer list.  They have continually seeded the Internet with new MD5 variants, and have adapted their code base to address the latest attempts to thwart Conficker.   They have infiltrated government sites, military networks, home PCs, critical infrastructure, small networks, and universities, around the world.  Perhaps an even greater threat than what they have done so far, is what they have learned and what they will build next."

Impressive stuff.


No comments: