OpenDNS and Kaspersky Take On Conficker
Conficker infects systems by taking advantage of a known vulnerability in the Windows' Server service in Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. (While a fix for this vulnerability has been available from Microsoft since October 23, 2008, not all users have necessarily installed the fix or run the relevant Windows Updates to ensure that their systems are properly protected.) Once a system is infected, Conficker uses brute-force, dictionary attacks of Administrator passwords on networks that the infected system is connected to; if Conficker successfully guesses an Administrator password, it can spread itself onto shared folders on the network. Conficker also places special DLLs and an autorun.inf file into shared folders and removable drives, such as USB flash drives; whenever a user attaches to an infected drive or shared folder, the Conficker autorun routine can automatically infect the system. (As the United States Computer Emergency Readiness Team warned a few weeks ago, just disabling Windows' AutoRun is not enough to avoid potential infection by the Conficker worm.) Once Conficker has infected a system, it then attempts to go online to receive additional instructions for next steps:
"Conficker, also known as Downadup, uses a set of seemingly random domain names as a meeting place for the virus to exchange data with its author, such as how many new machines each host has brought into the botnet, or details on any code upgrades or attacks the owner wants to take place. These domain names are generated using an algorithm so they change every day, making traditional methods like revoking domain registrations used by botnet authors ineffective."
OpenDNS is free service that can be set up on individual systems, routers, or even DNS routers; it serves between 8 and 9 billion DNS requests per day. OpenDNS generates revenue by displaying ads on a redirected OpenDNS page when a user tries to access a nonexistent webpage.