Conficker worm is set to start communicating with other computers on the Internet on April 1 like an April Fool s Day time bomb with some mysterious payload. The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors. The worm returned in recent attacks against web applications, IP cameras and routers. It has been reported in the past that the worm returned to recent attacks on web applications and IP cameras. To help clear up some of the confusion about Conficker, here are answers to common questions people may have.
Source: https://threatpost.com/faq-conficker-time-bomb-ticks-dont-expect-boom-033009/72445/

