meta_pixel
Tapesearch Logo
Log in
Malicious Life

ML_Conficker

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 18 July 2019

⏱️ 40 minutes

🧾️ Download transcript

Summary

Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure.



Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hey Malicious Life Listeners, before we start the episode I've got a special announcement.

0:05.3

If you're going to the Black Hat Security event in Las Vegas this coming August,

0:10.7

we've got great news for you. The Malicious Life team is holding a

0:14.3

pre-game pool party at the Mandalay Hotel in Vegas with drinks and appetizers,

0:20.0

relaxing, swimming, and an excellent opportunity to network with other malicious life fans.

0:26.0

So you're invited.

0:28.0

Head on to malicious. Live slash party to register and save your spot today.

0:34.0

Malicious. life slash party.

0:36.7

See you in Vegas. Hi and welcome to Malicious Life in collaboration with Cyberraven.

0:49.6

I'm Ren Levin.

0:51.1

On On August 20th, 2008, a Trojan was found running on a server located in South Korea.

1:02.0

It was named Gimmyv.a.

1:05.0

Gimmyvie was a rat, a remote access trojan which allowed its author control over the

1:11.0

infected machine. Rats are rather popular in the malware world of course,

1:16.0

but Gimme V was noteworthy for one reason.

1:20.0

It exploited a zero-day vulnerability in Windows operating systems.

1:24.7

Specifically, it targeted a vulnerability in a component called RPC-de-com, which allow programs running on two machines to communicate with one another.

1:36.2

RPC DCCOM was implemented on every PC running any version of Windows XP or earlier.

1:44.5

In 2008, this translated to around 800 million machines in total. And so when experts spotted Jimmy V on that South Korean server, it looked to be a ticking time bomb, a test run of sorts.

2:10.0

And the test was successful. In September 2008, Chinese malware distributors began selling toolkits for just $37 a pop that could help hackers exploit the newest RPC-decom vulnerability discovered by Jimmy V.

2:27.3

Word of the toolkit spread and demand among hackers worldwide grew so large that by October 26, its Chinese distributors

2:36.9

were made to give up the exploit code for free.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.