SlideShare uma empresa Scribd logo
1 de 17
Will your PC be safe on April 1  2009 Conficker C is all set to strike back on April 1. Here’s all about this virus/  Worm : what it does, how it spreads, symptoms that you have been hit and also how to escape it.
How to avoid conficker virus Source : Indiatimes Infotech & Agencies   Computer users beware, security experts have warned that the deadly Internet worm  Conficker C  is all set to strike back on April 1. According to Graham Cluley of security firm Sophos,  Conficker C  is programmed "to hunt for new instructions on April 1".  In January, the virus had infected more than nine million computers worldwide and was spreading at a rate of one million machines daily.  Here’s all about this virus: what it does, how it spreads, symptoms that you have been hit and also how to escape it.
The malicious software had yet to do any noticeable damage, prompting debate as to whether it is impotent, waiting to detonate, or a test run by cybercriminals intent on profiting from the weakness in the future.  "This is enormous; possibly the biggest virus we have ever seen," said software security specialist David Perry of Trend Micro. "I think the bad guys are field testing a new technology. If  Conficker  proves to work well, they could go out and sell malware to people. There is a huge market for selling criminal malware." One of the biggest virus
According to security experts,  Conficker's  most intriguing aspect is its multipronged attack strategy: It can spread three different ways. One is a vulnerability in Windows that Microsoft patched almost six months ago. The bug, which is in a file-sharing service that's included in all versions of the operating system, can be exploited remotely just by sending a malformed data packet to an unpatched PC.  Two, the worm can spread by password attacks, and third by copying itself to any removable USB-based devices such as flash drives and cameras. Anti-virus experts have warned that the worm can be easily spread between unprotected computers through the use of removable drives, such as USB sticks.   How it spreads
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx Microsoft's advisory about  Conficker  lists several symptoms of infection, including these:  * Account lockout policies are being tripped.  * Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender, and Error Reporting Services are disabled.  * Domain controllers respond slowly to client requests.  * The network is congested.  * Various security-related Web sites cannot be accessed.   In case your PC is showing any of these symptoms Microsoft recommends that you immediately use the MSRT to clean the machine. Users can download MSRT from Microsoft's site, or follow the instructions posted at its support site . How to know that my PC has been hit?
Once in a computer it digs deep, setting up defenses that make it hard to extract. The worm leaves the computer vulnerable to further exploitation by hackers and spammers, who are able to remotely download more malicious programs onto the computer, or even use the worm to help install software that will enable them to track and steal security information, such as banking logins or credit card information.  Malware  could also be triggered to turn control of infected computers over to hackers amassing "zombie" machines into  "botnet " armies. "Here we are with a big, big outbreak and they keep revamping their methodology to increase the size of it," Perry said. "They could be growing this huge botnet to slice it up and sell it on the criminal market." How damaging it is?
A troubling aspect of  Conficker  is that it harnesses computing power of a  botnet  to crack passwords. Repeated "guesses" at passwords by a  botnet  have caused some computer users to be locked out of files or machines that automatically disable access after certain numbers of failed tries.  " Conficker  uses brute force from the infected network of  botnets  to break the password of the machine being attacked," Perry said. "That is something never seen before and I find it disturbing." Cracks passwords
According to Microsoft, unpatched Windows 2000, Windows XP and Windows Server 2003 machines are at the greatest risk. There are also reports from security companies, which highlight the danger to PCs running Windows XP Service Pack 2 and XP Service Pack3. Incidentally, these versions account for the bulk of Windows' market share.  Unpatched Windows Vista and Server 2008 systems are less likely to fall victim to these attack, since hackers need to authenticate access to the computer, in other words know the log-in username and password. Most vulnerable machines
Microsoft advises people to stay current on anti-virus tools and Windows updates, and to protect computers and files with strong passwords. Microsoft issued a new series of security patches to try and help computer users defend their machines against the worm.  Security experts urge people to harden passwords by mixing in numbers, punctuation marks, and upper-case letters. Doing so makes it millions of times harder for passwords to be deduced.  "This is necessary in a world where   malware hacks passwords ,"  Perry said.  " Go get a notebook, keep it next to your computer and record your password in it. No hacker in the world can hack the written page locked away in your office." How to escape the worm
'Solution   promised' As antivirus companies worldwide scramble to erect defences against the Conficker C worm, an Indian company has successfully found a way to beat the computer worm. MicroWorld Technologies' security solution claims to not only detect, but also eliminate Conficker C and block any further attempts by the worm to reinstall itself on the system.  Govind Rammurthy, CEO & MD, MicroWorld Technologies said, "A three-pronged strategy is needed to tackle Conficker C an updated antivirus software, firewall protection on each and every computer in the network and the latest Microsoft   patches."
MicroWorld's recently launched eScan version 10 software also incorporates daily updates against the Conficker virus, which the company built after buyers of previous versions complained of Conficker attacks.   " Most companies don’t treat antivirus updates seriously. That, and having a common firewall for the entire network, leaves them vulnerable to attacks," Rammurthy says. Because the Conficker worm downloads fresh versions of itself on an hourly basis, eScan 10 is updated 8-9 times daily. It also provides each computer with its own firewall, thus screening every software that seeks access to the computer and automatically downloads key patches released by Microsoft.
 
 
 
 
 
Thank you For watching  This  Presentation from  Bob  ( Biju )  Mathews

Mais conteúdo relacionado

Mais procurados

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case StudyAmr Thabet
 
Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.Hardeep Bhurji
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer SecurityNicholas Davis
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheetMichael Gough
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackAjinkya Nikam
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 

Mais procurados (20)

History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 
Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.
 
MALWARE
MALWAREMALWARE
MALWARE
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Virus part2
Virus part2Virus part2
Virus part2
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Wannacry
WannacryWannacry
Wannacry
 
Ransomware
RansomwareRansomware
Ransomware
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Semelhante a Conficker

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!UltraUploader
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014Truong Minh Yen
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 

Semelhante a Conficker (20)

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
File000145
File000145File000145
File000145
 
Hamza
HamzaHamza
Hamza
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Information security
Information securityInformation security
Information security
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Malware
MalwareMalware
Malware
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 

Último

ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 

Último (20)

ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

Conficker

  • 1. Will your PC be safe on April 1 2009 Conficker C is all set to strike back on April 1. Here’s all about this virus/ Worm : what it does, how it spreads, symptoms that you have been hit and also how to escape it.
  • 2. How to avoid conficker virus Source : Indiatimes Infotech & Agencies Computer users beware, security experts have warned that the deadly Internet worm Conficker C is all set to strike back on April 1. According to Graham Cluley of security firm Sophos, Conficker C is programmed "to hunt for new instructions on April 1". In January, the virus had infected more than nine million computers worldwide and was spreading at a rate of one million machines daily. Here’s all about this virus: what it does, how it spreads, symptoms that you have been hit and also how to escape it.
  • 3. The malicious software had yet to do any noticeable damage, prompting debate as to whether it is impotent, waiting to detonate, or a test run by cybercriminals intent on profiting from the weakness in the future. "This is enormous; possibly the biggest virus we have ever seen," said software security specialist David Perry of Trend Micro. "I think the bad guys are field testing a new technology. If Conficker proves to work well, they could go out and sell malware to people. There is a huge market for selling criminal malware." One of the biggest virus
  • 4. According to security experts, Conficker's most intriguing aspect is its multipronged attack strategy: It can spread three different ways. One is a vulnerability in Windows that Microsoft patched almost six months ago. The bug, which is in a file-sharing service that's included in all versions of the operating system, can be exploited remotely just by sending a malformed data packet to an unpatched PC. Two, the worm can spread by password attacks, and third by copying itself to any removable USB-based devices such as flash drives and cameras. Anti-virus experts have warned that the worm can be easily spread between unprotected computers through the use of removable drives, such as USB sticks. How it spreads
  • 5. http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx Microsoft's advisory about Conficker lists several symptoms of infection, including these: * Account lockout policies are being tripped. * Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender, and Error Reporting Services are disabled. * Domain controllers respond slowly to client requests. * The network is congested. * Various security-related Web sites cannot be accessed. In case your PC is showing any of these symptoms Microsoft recommends that you immediately use the MSRT to clean the machine. Users can download MSRT from Microsoft's site, or follow the instructions posted at its support site . How to know that my PC has been hit?
  • 6. Once in a computer it digs deep, setting up defenses that make it hard to extract. The worm leaves the computer vulnerable to further exploitation by hackers and spammers, who are able to remotely download more malicious programs onto the computer, or even use the worm to help install software that will enable them to track and steal security information, such as banking logins or credit card information. Malware could also be triggered to turn control of infected computers over to hackers amassing "zombie" machines into "botnet " armies. "Here we are with a big, big outbreak and they keep revamping their methodology to increase the size of it," Perry said. "They could be growing this huge botnet to slice it up and sell it on the criminal market." How damaging it is?
  • 7. A troubling aspect of Conficker is that it harnesses computing power of a botnet to crack passwords. Repeated "guesses" at passwords by a botnet have caused some computer users to be locked out of files or machines that automatically disable access after certain numbers of failed tries. " Conficker uses brute force from the infected network of botnets to break the password of the machine being attacked," Perry said. "That is something never seen before and I find it disturbing." Cracks passwords
  • 8. According to Microsoft, unpatched Windows 2000, Windows XP and Windows Server 2003 machines are at the greatest risk. There are also reports from security companies, which highlight the danger to PCs running Windows XP Service Pack 2 and XP Service Pack3. Incidentally, these versions account for the bulk of Windows' market share. Unpatched Windows Vista and Server 2008 systems are less likely to fall victim to these attack, since hackers need to authenticate access to the computer, in other words know the log-in username and password. Most vulnerable machines
  • 9. Microsoft advises people to stay current on anti-virus tools and Windows updates, and to protect computers and files with strong passwords. Microsoft issued a new series of security patches to try and help computer users defend their machines against the worm. Security experts urge people to harden passwords by mixing in numbers, punctuation marks, and upper-case letters. Doing so makes it millions of times harder for passwords to be deduced. "This is necessary in a world where malware hacks passwords ," Perry said. " Go get a notebook, keep it next to your computer and record your password in it. No hacker in the world can hack the written page locked away in your office." How to escape the worm
  • 10. 'Solution promised' As antivirus companies worldwide scramble to erect defences against the Conficker C worm, an Indian company has successfully found a way to beat the computer worm. MicroWorld Technologies' security solution claims to not only detect, but also eliminate Conficker C and block any further attempts by the worm to reinstall itself on the system. Govind Rammurthy, CEO & MD, MicroWorld Technologies said, "A three-pronged strategy is needed to tackle Conficker C an updated antivirus software, firewall protection on each and every computer in the network and the latest Microsoft patches."
  • 11. MicroWorld's recently launched eScan version 10 software also incorporates daily updates against the Conficker virus, which the company built after buyers of previous versions complained of Conficker attacks. " Most companies don’t treat antivirus updates seriously. That, and having a common firewall for the entire network, leaves them vulnerable to attacks," Rammurthy says. Because the Conficker worm downloads fresh versions of itself on an hourly basis, eScan 10 is updated 8-9 times daily. It also provides each computer with its own firewall, thus screening every software that seeks access to the computer and automatically downloads key patches released by Microsoft.
  • 12.  
  • 13.  
  • 14.  
  • 15.  
  • 16.  
  • 17. Thank you For watching This Presentation from Bob ( Biju ) Mathews