What is Conficker Worm and Illustration of How Does it works

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction. It exploits a vulnerability in Windows that Microsoft patched in October. It is commonly known as Kido or Downadup and first appeared in November.

Conficker.B, detected in February, added the ability to spread through network shares and via removable storage devices, like USB drives, through the AutoRun function in Windows.

Conficker.C, which surfaced earlier this month, shuts down security services, blocks computers from connecting to security Web sites, and downloads a Trojan. It also reaches out to other infected computers via peer-to-peer networking and includes a list of 50,000 different domains, of which 500 will be contacted by the infected computer on April 1 to receive updated copies or other malware or instructions. Previous Conficker variants were written to connect to 250 domains a day.

The latest variant of the Conficker worm is supposed to start communicating with other computers on the Internet on April 1–like an April Fool’s Day time bomb with some mysterious payload.

This is an illustration of how the Conficker worm works according to Microsoft:

Conficker Worrn Diagram

 

What can you do to protect yourself from this worm?
You should apply the Microsoft patch and update your antivirus and other security software.

You should also apply a Microsoft update for the AutoRun feature in Windows that was released in February. The patch allows people to selectively disable the Autorun functionality for drives on a system or network to provide more security, to ensure that it is truly disabled. In addition to putting USB drive users at risk of Conficker and other viruses, the Autorun functionality has been blamed for infections from digital photo frames and other storage types.

Panda also has released a free "vaccine" tool for blocking viruses that spread through USB drives.

Microsoft has a Conficker removal tool.

1,236 Comments

  1. Pingback: phoenix seguros

  2. Pingback: lbbusnelli.info

  3. Pingback: dumpster Grand Island NE

  4. Pingback: garbage dumpster rental

  5. Pingback: more leads

  6. Pingback: ontariohypnosiscentre.info

  7. Pingback: dritec.biz

  8. Pingback: studentintuition.info

  9. Pingback: ozfoxes.info

  10. Pingback: templestone.info

  11. Pingback: dreamceojobs.com

  12. Pingback: writing-courses.info

  13. Pingback: porvairindia.com

  14. Pingback: toptrainingcenters.com

  15. Pingback: zhongjiliseo.com

  16. Pingback: ctsoupkitchen.com

  17. Pingback: araderaudubongalleries.info

  18. Pingback: dalkiamarianskelazne.com

  19. Pingback: champkitchenandbar.com

  20. Pingback: loudountechnologyleague.com

  21. Pingback: autochlorkansas.com

  22. Pingback: städhjälp stockholm

  23. Pingback: futurecitiesdevelopment.com

  24. Pingback: irvington-moore.com

  25. Pingback: exploittheearthordie.com

  26. Pingback: economiaemanagement.com

  27. Pingback: msgsulfites.com

  28. Pingback: nyariiskola.com

  29. Pingback: myjungfrauregion.com

  30. Pingback: BlueOrchard

  31. Pingback: officialryanfalconer.com

  32. Pingback: artiwydawnictwo.com

  33. Pingback: ubezpieczenie-na-zycie-uk.com

  34. Pingback: ingridst-pierre.com

  35. Pingback: buytramadoleasy.com

  36. Pingback: ultrasafefingerflange.com

  37. Pingback: rubyopensourcechallenge.com

  38. Pingback: Website design

  39. Pingback: Cheap Ugg Boots

  40. Pingback: confidence building tips

  41. Pingback: Dine art

  42. Pingback: free graphic design templates for download

  43. Pingback: pure garcinia cambogia extract reviews

  44. Pingback: armored vehicles

  45. Pingback: optomechanic-bg.org

  46. Pingback: joslindubai.org

  47. Pingback: europe-plus.org

  48. Pingback: mennopages.org

  49. Pingback: closeoutclothing.org

  50. Pingback: german-documentaries.org

Leave a Comment

Your email address will not be published. Required fields are marked *