What is Conficker Worm and Illustration of How Does it works

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction. It exploits a vulnerability in Windows that Microsoft patched in October. It is commonly known as Kido or Downadup and first appeared in November.

Conficker.B, detected in February, added the ability to spread through network shares and via removable storage devices, like USB drives, through the AutoRun function in Windows.

Conficker.C, which surfaced earlier this month, shuts down security services, blocks computers from connecting to security Web sites, and downloads a Trojan. It also reaches out to other infected computers via peer-to-peer networking and includes a list of 50,000 different domains, of which 500 will be contacted by the infected computer on April 1 to receive updated copies or other malware or instructions. Previous Conficker variants were written to connect to 250 domains a day.

The latest variant of the Conficker worm is supposed to start communicating with other computers on the Internet on April 1–like an April Fool’s Day time bomb with some mysterious payload.

This is an illustration of how the Conficker worm works according to Microsoft:

Conficker Worrn Diagram

 

What can you do to protect yourself from this worm?
You should apply the Microsoft patch and update your antivirus and other security software.

You should also apply a Microsoft update for the AutoRun feature in Windows that was released in February. The patch allows people to selectively disable the Autorun functionality for drives on a system or network to provide more security, to ensure that it is truly disabled. In addition to putting USB drive users at risk of Conficker and other viruses, the Autorun functionality has been blamed for infections from digital photo frames and other storage types.

Panda also has released a free "vaccine" tool for blocking viruses that spread through USB drives.

Microsoft has a Conficker removal tool.

446 Comments

  1. Pingback: patriotcoalcommittee.com

  2. Pingback: arbitrationacademy-students.org

  3. Pingback: ciocador.info

  4. Pingback: leonardotransactions.com

  5. Pingback: unicompinc.info

  6. Pingback: susanvilleeconomicdevelopment.com

  7. Pingback: avesdevenezuela.org

  8. Pingback: claires1dsweepstakes.com

  9. Pingback: baltimoreemploymentguide.com

  10. Pingback: check more

  11. Pingback: cerofalta.net

  12. Pingback: check now

  13. Pingback: New Movies

  14. Pingback: csr-bg.org

  15. Pingback: femmenaturalboost.com

  16. Pingback: visit website

  17. Pingback: yellow-seven.com

  18. Pingback: avevenezuela.org

  19. Pingback: Popcorn Time

  20. Pingback: symposionline.info

  21. Pingback: check more

  22. Pingback: business telephone systems

  23. Pingback: biocontrolforconservation.org

  24. Pingback: Popcorn Time

  25. Pingback: my website

  26. Pingback: wbfafrica.info

  27. Pingback: solinstruments.info

  28. Pingback: hash-cracker.info

  29. Pingback: celebrategrandparents.org

  30. Pingback: friendsofcapemayrefuge.info

  31. Pingback: view more

  32. Pingback: energibesparelser.org

  33. Pingback: collegiatecompass.org

  34. Pingback: dallasopenspaces.org

  35. Pingback: foolproofcalifornia.org

  36. Pingback: bya5844.com

  37. Pingback: lbknews.info

  38. Pingback: injury lawyer brampton

  39. Pingback: visit us now

  40. Pingback: top personal injury lawyer brampton

  41. Pingback: toronto locksmiths downtown

  42. Pingback: afro kinky clip in extensions

  43. Pingback: free web design templates and designed graphics for download

  44. Pingback: visit now

  45. Pingback: visit here

  46. Pingback: Anthony

  47. Pingback: dikabarin.com

  48. Pingback: Ethan

  49. Pingback: Jackson

  50. Pingback: Luis

Leave a Comment

Your email address will not be published. Required fields are marked *