Skip to main content

Conficker April 1st - April Fools Virus

When you first bought your computer (workstation) or your laptop, did you set your Automatic Updates to install Microsoft Security Updates daily?

Did you install anti-virus software and download updates daily?

If you have not done it lately, it's highly recommended to download the latest Windows Security Updates and run anti-virus live update for your workstation. This is to minimize risk of exposure, patch vulnerabilty and close known exploit. This coming April 1st, April fools day a virus known as The Conficker Worm will start attacking computers connected to the network and Internet. I don't know the attack pattern, in the past the attacker created a botnet to disabled known website through Destributed Denial of Service (DDoS) Attack. The method of attack might be different as they know that most businesses added security measures against this type of attack.
This is the time to run Windows Update, update your antibot software, and update your anti-virus software.

Here's how to check you workstation via Microsoft OneCare online service.
For Windows XP, please use this link:
http://onecare.live.com/site/en-us/default.htm

For Windows Vista, please use this link:
http://onecare.live.com/site/en-us/center/whatsnew.htm

To run the online tool, you need to use Microsoft Internet Explorer 6.0+ browser. I'm not surprise that they don't support Google Chrome or Firefox to run this tool. Click on Full Scan, it will take a while to complete the scan depending on how many files you have in your workstation. Be patient.

After the scan, read the report.

Norton website provide detailed information about The Conficker Worm.

What to do if you are infected? Here's a three (A, B, C) different approach to correct this problem. Click the one appropriate for your workstation.

For more information, please visit the following website:

Post your comments and suggestions here. Thank you.

Comments

  1. even if someone used Conficker to steal my credit card info, there wouldn't be any credit there for them to exploit or spend

    ReplyDelete
  2. As of this time, there is nothing newsworthy to report to you (yet) about this virus.

    Have a safe computing environment.

    ReplyDelete
  3. By the way, just in case you need information on how to remove this virus. Here's some removal instructions from dshield.org website.

    Squeeze Message Link:
    http://www.sm.tv/8
    Original Link:
    http://www.dshield.org/diary.html?storyid=5860

    ReplyDelete

Post a Comment

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp