Get a Pentest and security assessment of your IT network.

Cyber Security

How to identify and clean Conficker infections

The Honeynet Project on Monday released a paper with a detailed analysis of the Conficker worm as well as some weaknesses in its design that allow for identification of infected machines. In their paper, the Honeynet researchers lay out exactly how to identify and disinfect compromised machines. Conficker attempts to patch the Windows flaw that it uses to compromise machines. But it does so in a sloppy way that allows researchers to identify infected PCs. This information can be used to remotely scan for Conficker infections. In addition to actively scanning, machines infected with Conficker.A and.B can be identified using the presented IDS signatures.

Source: https://threatpost.com/how-identify-and-clean-conficker-infections-033109/72446/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security