The worm also attaches itself to certain Windows processes such as svchost.exe, explorer.exe and services.exe. The instructions it receives may include to propagate, gather personal information and to download and install additional malware onto your computer. It receives further instructions by connecting to a server. When executed on a computer, Conficker disables a number of system services such as Windows Automatic Update, Windows Security Center, Windows Defender and Windows Error Reporting. This is important becuase people who may install an antivirus program because of this outbreak will not be completely protected as were dealing with a complex and intelligent worm that uses both virus and spyware type attacks. The worm then tries to spread itself to other computers on that same network. Downadup) can also download malware and spyware down to your comptuer. If it finds a vulnerable computer, it turns off the automatic backup service, deletes previous restore points, disables many security services, blocks access to a number of security web sites and opens infected machines to receive additional programs from the malware’s creator. The Conficker worm mostly spreads across networks. In other words, the botnet will be used to send SPAM, steal identities and direct users to online scams and phishing sites. Some experts believe, however, that Conficker will ultimately turn out to be a virus that has been written for profit. Initial reports indicated that Conficker was serving up advertisements for fake antivirus programs.īeyond that, nothing much else has happened.Ĭonficker certainly does ensnare infected machines into a botnet but so far the botnet hasn’t been utilised in any meaningful way. Infected machines can be manipulated in a number of ways. Those behind the worm can also remotely control those machines too, via something known as a botnet. The Conficker worm has created an infrastructure that the creators of the worm can use to remotely install software on infected machines. What does the Conficker worm actually do?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |