Surely 2009 is the most sensitive year for peer-to-peer and the industry crusade against free on-line contents sharing. In Italy we have the previously discussed issues with the incompetence and obscene servility of our representatives, and moving the attention toward Europe things get even worse if possible. Two in particular are the noticeable questions of these weeks in Europe, the conviction of The Pirate Bay crew and the approval in France of the Sarkozy doctrine also known as three strike law or HADOPI law.
More than a week after the 1st of April, the day when the Internet stood still because according to the press the Conficker/Downup/Downadup/Kido worm could have destroyed the net, the infrastructures, civilized mankind and the entire planet things are going more or less as usual: Internet remains a dangerous place but it hasn’t exploded like a supernova, and bits are flowing quickly from a part to another one of the planet. The true novelty is that the botnet built up by one of the most complex malware ever finally shows what its true purpose is.
Since, in 2005, the nasty commercial policies of Sony BMG uncovered the possibility to seize control on the operating system to hinder the normal working of the PC and peripherals, the evolution of rootkit software went through an unparalleled acceleration. The interest for the matter rose in research and among cyber-criminals gangs, with the result that can be esteemed in these days: rootkits have reached the lowest levels of electronic devices circuitry by infecting network routers, the BIOS and even the most privileged working mode of the x86 processors.
Conficker/Downup/Downadup/Kido malware, Symantec writes in the first edition of The Downadup Codex, “is, to date, one of the most complex worms in the history of malicious code“. At first spread through a flaw within the Windows Server service, the threat has grown immensely because of a combination of elements that facilitated its diffusion and drove the IT industry to unite in the attempt to block its further proliferation.
Conficker (also known as Downup, Downadup or Kido) is the worm that first, after the Sasser outbreak in 2004, was able to exploit a flaw in a Windows remote service, and due to this unusual ability the malware became in turn the target of a large part of the IT industry that, leaded by Microsoft, is trying in these days to defuse the time bomb of an enormous botnet yet with unknown practical outcomes.
Well, I must say it’s so much time by now that I didn’t remember an August so rich of events and news and all the rest. So either I have a poor memory or it’s the nth trickery of the enormous, relentless mechanism of chance, that has compressed in a few days so much interesting things at the point that I’m seriously thinking of closing the blog for a “surplus” of contents cues 😛