In November of 2008, a sophisticated worm named Conficker was released to exploit the MS08-067 NetBIOS Windows vulnerability. Over the past 5 months, a botnet (software robot or zombie computer) of infected systems has grown to approx 1-2 million computers. During this same time frame, a number of variants of the worm have been released, each adding new “features” to the worm.
The latest variant of the Conficker worm, dubbed Conficker.D, was released March 30, 2009. A new peer-to-peer method was introduced for command & control of the botnet and a “phone-home” mechanism is programmed to go live on April 1st, 2009.
A small percentage of the 1-2 million affected hosts are infected by the latest version of Conficker (most estimates are less than 10%). While there is significant media coverage, April 1 is only a preprogrammed date when infected hosts may begin checking for updates. It does not necessarily mean there will be attacks or updates from the worm authors for download. Today, infected hosts may currently receive new instructions via the old P2P mechanisms.
lol we got that when it first came out due to a WSUS fuck up… there wasn’t much published on it so we manually killed services and edited out reg keys.
what a pain in the cock that was. we’re patched up like fort knox now.
So my computer has been making the sound like its out of virtual memory, that beep, instead of something else normal. I scanned with my paid version of Mcaffe yesterday, but it didnt find anything.
Hahah a few of our customers were scared that this worm would take out their WAN with the data it would push over it their networks. They rushed to get the patches out and ended up taking out their WAN theirselves.
Also, isnt this a worm since its building a botnet and exploiting a process, not a virus?