What is Conficker Worm and Illustration of How Does it works

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction. It exploits a vulnerability in Windows that Microsoft patched in October. It is commonly known as Kido or Downadup and first appeared in November.

Conficker.B, detected in February, added the ability to spread through network shares and via removable storage devices, like USB drives, through the AutoRun function in Windows.

Conficker.C, which surfaced earlier this month, shuts down security services, blocks computers from connecting to security Web sites, and downloads a Trojan. It also reaches out to other infected computers via peer-to-peer networking and includes a list of 50,000 different domains, of which 500 will be contacted by the infected computer on April 1 to receive updated copies or other malware or instructions. Previous Conficker variants were written to connect to 250 domains a day.

The latest variant of the Conficker worm is supposed to start communicating with other computers on the Internet on April 1–like an April Fool’s Day time bomb with some mysterious payload.

This is an illustration of how the Conficker worm works according to Microsoft:

Conficker Worrn Diagram


What can you do to protect yourself from this worm?
You should apply the Microsoft patch and update your antivirus and other security software.

You should also apply a Microsoft update for the AutoRun feature in Windows that was released in February. The patch allows people to selectively disable the Autorun functionality for drives on a system or network to provide more security, to ensure that it is truly disabled. In addition to putting USB drive users at risk of Conficker and other viruses, the Autorun functionality has been blamed for infections from digital photo frames and other storage types.

Panda also has released a free "vaccine" tool for blocking viruses that spread through USB drives.

Microsoft has a Conficker removal tool.


  1. Pingback: nyc2013debate.org

  2. Pingback: sol-instruments.info

  3. Pingback: isgreece.org

  4. Pingback: europakorridoren.org

  5. Pingback: love-n-carepets.org

  6. Pingback: cityofbooks.org

  7. Pingback: findyourselfinsilvercity.org

  8. Pingback: benguet.net

  9. Pingback: persuadingcongress.org

  10. Pingback: gaztelanbidean.net

  11. Pingback: avesvenezuela.org

  12. Pingback: hssmotionanalysislab.org

  13. Pingback: noveentv19.info

  14. Pingback: medjobla.org

  15. Pingback: symposiumline.info

  16. Pingback: connectionexchange.org

  17. Pingback: neuroskills.org

  18. Pingback: mocare.org

  19. Pingback: brightbeginnings4families.org

  20. Pingback: evoteinspector.org

  21. Pingback: awel-deg.org

  22. Pingback: guernica-editions.org

  23. Pingback: extremefuturistfestival.info

  24. Pingback: intermountainroundwoodassociation.org

  25. Pingback: dennysociety.org

  26. Pingback: mimejordieta.org

  27. Pingback: webgeol.info

  28. Pingback: feriformarchofdimes.org

  29. Pingback: asiapacificforesightconference.org

  30. Pingback: mosilab.org

  31. Pingback: kmuchannel.info

  32. Pingback: cosmicwomb.org

  33. Pingback: tankauto.info

  34. Pingback: you could try this out

  35. Pingback: lingofriends.org

  36. Pingback: babatim.org

  37. Pingback: Identity access management

  38. Pingback: paulpaulito.org

  39. Pingback: discounts-for-nonprofits.org

  40. Pingback: mountain-alliance.org

  41. Pingback: kgl-moent.info

  42. Pingback: bringveronicahome.org

  43. Pingback: Hassan Loflen

  44. Pingback: Val Justus

  45. Pingback: travelstyletours forum

  46. Pingback: saveamericascinema.org

  47. Pingback: steinlodge.org

  48. Pingback: stephanieurbinajones.net

  49. Pingback: rrinyc.org

  50. Pingback: shadesgrey.net

Leave a Comment

Your email address will not be published. Required fields are marked *