Conficker Timeline
The Last Watchdog has compiled a simple timeline to show the evolution of Conficker that begins with Chinese hackers selling a $37 malware kit in September 2008 designed to exploit a security hole in Windows, and ends with what infected PCs will do come April 1 2009.
Conficker C Analysis
The computer science laboratory at SRI International, sponsored by the National Science Foundation and the U.S. Army Research Office, has released a detailed analysis of Conficker C.
Ensure you've got the latest Microsoft patch
Microsoft recommends you manually download the Windows Malicious Software Removal Tool. Note: This is not a replacement for anti-virus software, rather an additional defense.
Disable Autorun
PC World suggests disabling Autorun so that your machine won't be automatically infected when you connect to infected removable media. A how-to can be found here. Note: This involves changing the registry file on Windows and should only be done by those confident in their abilities.
Search for and destroy Conficker with F-Secure
F-Secure has a free and easy-to-use tool to check for and remove worms; including the dreaded Conficker.
Use McAfee's Stinger which will update daily in preparation for April 1
McAfee has created a special build of its standalone cleaning tool Stinger which it will be updating daily to include any new Conficker variants.
No Download: Scan on the Web
Create a free account (registration required) with Panda Security's ActiveScan to perform an online scan of your machine.
No comments:
Post a Comment