Page 1 of 1

Beware Conficker worm

Posted: Thu Mar 26, 2009 5:39 am
by Skeithex
In an event that hits the computer world only once every few years, security experts are racing against time to mitigate the impact of a bit of malware which is set to wreak havoc on a hard-coded date. As is often the case, that date is April 1.

Malware creators love to target April Fool's Day with their wares, and the latest worm, called Conficker C, could be one of the most damaging attacks we've seen in years.

Conficker first bubbled up in late 2008 and began making headlines in January as known infections topped 9 million computers. Now in its third variant, Conficker C, the worm has grown incredibly complicated, powerful, and virulent... though no one is quite sure exactly what it will do when D-Day arrives.

Thanks in part to a quarter-million-dollar bounty on the head of the writer of the worm, offered by Microsoft, security researchers are aggressively digging into the worm's code as they attempt to engineer a cure or find the writer before the deadline. What's known so far is that on April 1, all infected computers will come under the control of a master machine located somewhere across the web, at which point anything's possible. Will the zombie machines become denial of service attack pawns, steal personal information, wipe hard drives, or simply manifest more traditional malware pop-ups and extortion-like come-ons designed to sell you phony security software? No one knows.

Conficker is clever in the way it hides its tracks because it uses an enormous number of URLs to communicate with HQ. The first version of Conficker used just 250 addresses each day -- which security researchers and ICANN simply bought and/or disabled -- but Conficker C will up the ante to 50,000 addresses a day when it goes active, a number which simply can't be tracked and disabled by hand.

At this point, you should be extra vigilant about protecting your PC: Patch Windows completely through Windows Update and update your anti-malware software as well. Make sure your antivirus software is actually running too, as Conficker may have disabled it.

Microsoft also offers a free online safety scan here, which should be able to detect all Conficker versions.

source

scan

this could be bad, specially for public computers. (schools, library, ect.)

Posted: Thu Mar 26, 2009 8:33 am
by SetoTK
yawn, this news is weeks old

and have already encountered several twats who are incapable of following simple advice in protecting there pc's.

But hey what do i care i actually bother to protect my network in a manner befitting it.

Posted: Thu Mar 26, 2009 9:16 am
by froggyboy604
I think School and Library computers won't have much of a problem were I live since most public computers run in non-admin mode, and have almost everything disabled except for IE, and word.

I also have a updated firewall, and antivirus running.

Posted: Fri Mar 27, 2009 2:18 am
by SetoTK
You would be surprise i've come across public computer where even in non-admin modes you could change system settings.

Posted: Fri Mar 27, 2009 9:15 am
by Skeithex
SetoTK wrote:You would be surprise i've come across public computer where even in non-admin modes you could change system settings.
I have used some computers like that. anyways, only people who don't update their computer are in trouble.

Posted: Fri Mar 27, 2009 11:29 am
by froggyboy604
my school use to force people to use their library cards inorder to use the internet, but I just execute the browsers by going to C:/Program files/Internet explorer or us Windows Key +R and type in the link in the run box and go online.