By early 2009, Conficker B had infected millions of machines. It had invaded the United Kingdoms Defense Ministry. As CBS prepared a 60 Minutes segment on the worm, its computers were struck. In both instances, security experts scrambled to uproot the invader, badly disrupting normal functioning of the system. Conficker now had the worlds attention. In February 2009, the cabal became more formal. Headed initially by a Microsoft program manager, and eventually by Joffe, it became the Conficker Working Group. Microsoft offered a *250,000 bounty for the arrest and conviction of the worms creators.
The newly named team went to work trying to corral Conficker B. Getting rid of it was out of the question. Even though they could scrub it from an infected computer, there was no way they could scrub it from all infected computers. The millions of machines in the botnet were spread all over the world, and most users of infected ones didnt even know it. It was theoretically feasible to unleash a counter-worm, something to surreptitiously enter computers and take out Conficker, but in free countries, privacy laws frown on invading peoples home computers. Even if all the governments got together to allow a massive attack on Confickeran unlikely eventthe new version of the worm had new ways of evading the threat.
Conficker C appeared in March 2009, and in addition to being impressed by its very snazzy crypto, the Conficker Working Group noticed that the new worms code threatened to up the number of domain names generated every day to 50,000. The new version would begin generating that many domain names daily on April 1. At the same time, all computers infected with the old variants of Conficker that could be reached would be updated with this new strain. The move suggested that the bad guys behind Conficker understood not just cryptology, but also the mostly volunteer nature of the cabal.
You know youre dealing with someone who not only knows how botnets work, but who understands how the security community works, Andre DiMino told me. This is not just a bunch of organized criminals that, say, commission someone to write a botnet for them. They know the challenges that the security community faces internally, politically, and economically, and are exploiting them as well.
The bad guys knew, for instance, that preregistering even 250 domain names a day at *10 a pop was doable for the good guys. As long as the number remained relatively small, the cabal could stay ahead of them. But how could the good guys cope with a daily flood of 50,000? It would require an unprecedented degree of cooperation among competing security firms, software manufacturers, nonprofit organizations like Shadowserver, academics, and law enforcement.
You cant just register all 50,000youve got to go one by one and make sure the domain name doesnt already exist, Joffe says. And if it exists, youve got to make sure that it belongs to a good guy, not a bad guy. Youve got to make a damn phone call for any of the new ones, and have to send someone out there to do itand these are spread all over the world, including some very remote places, Third World countries. Now the bar had been raised to a level that was almost insurmountable.
The worm was already running rings around the good guys, and then, just for good measure, it planted a pie in their faces on, of all days, April 1. By playing with the new variant in their sandboxes, the cabal knew that the enhanced domain-name-generating algorithm would click in on that day. If the update succeeded, it would be a game-changer. It was the most dramatic moment since Conficker had surfaced the previous November. Apparently, at long last, this extraordinary tool was going to be put to use. But for what? The potential was scary. Few people outside the upper echelon of computer security even understood what Conficker was, much less what was at stake on April 1, but word of a vague impending digital doomsday spread. The popular press got hold of it. There were headlines and the usual spate of ill-informed reports on cable TV and the Internet. When the day arrived, those who had been warning about the dangers of this new worm were sure to see their fears vindicated.
The cabal mounted a heroic effort to shut down the worms potential command centers in advance of the update, coordinating directly with the Internet Corporation for Assigned Names and Numbers, the organization that supervises registries worldwide. It was our finest hour, Joffe says.
I dont think that the bad guys could have expected the research community to come together as it did, because it was pretty unprecedented, Ramses Martinez, director of information security for VeriSign, told me. That was a new thing that happened. I mean, if you would have told me everybodys going to come togetherby everybody, I mean all these guys in this computer-security world that know each otherand theyre going to do this thing, I would have said, Youre crazy. I dont think the bad guys could have expected that.
Much of the computer world was watching, in considerable suspense, to see what would happen on April 1. It was like the moment in a movie when the bad guy at last has cornered the hero. He pulls out an enormous gun and aims it at the heros head, pulls the trigger and out pops a little flag with the word BANG!
Conficker found one or two domain names that Joffes group had missed, which was all it needed. The cabals efforts had succeeded in vastly reducing the number of machines that got the update, but the ones that did went to work distributing a very conventional, well-known malware called Waledac, which sends out e-mail spam selling a fake anti-spyware program. The worm was used to distribute Waledac for two weeks, and then stopped.
But something much more important had happened. The updated worm didnt just up the ante by generating 50,000 domain names daily; it effectively moved the game out of the cabals reach.
April 1 came and went, and in the middle of that night the systems switched over to the new algorithm, Conficker C, Joffe told me. Thats all that was supposed to happen, and it happened. But the Internet didnt get infected; it was just an algorithm change in the software. So of course the press said, Conficker is a bust.
Public concern over the worm fizzled, just as the problem grew worse: the new version of Conficker introduced peer-to-peer communications, which was disheartening to the good guys, to say the least. Peer-to-peer operations meant the worm no longer had to sneak in through Windows Port 445 or a USB drive; an infected computer spread the worm directly to every machine it interacted with. It also meant that Conficker no longer needed to call out to a command center for instructions; they could be distributed directly, computer to computer. And since the worm no longer needed to call home, there was no longer any way to tell how many computers were infected.
In the great chess match, the worm had just pronounced Checkmate.