Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Guest Blog // Selected Security Content Provided By Sophos
What's This?
4/2/2009
07:13 AM
Graham Cluley
Graham Cluley
Security Insights
50%
50%

A Quick And Easy Way To Tell If You're Infected With Conficker

Even though April 1st is now history, you would be foolish to think the Conficker worm is no longer a problem. It's still out there, still causing a nuisance, and could be instructed to activate a payload whenever the hackers choose. So what you want is a quick and easy way to tell if you might be infected, right?

Even though April 1st is now history, you would be foolish to think the Conficker worm is no longer a problem. It's still out there, still causing a nuisance, and could be instructed to activate a payload whenever the hackers choose. So what you want is a quick and easy way to tell if you might be infected, right?Well, the good news is that besides the myriad of free Conficker removal tools that antivirus companies have come up with, a guy named Joe has come up with something beautiful, simple, and neat that doesn't involve you installing any software at all!

Joe Stewart is the director of malware research at SecureWorks, and he has created a neat Web page that instantly and visually tells you if you're likely to be infected by the Conficker worm.

It works by presenting a page of Website logos. Because the Webpage drags down images of Websites that are blocked by the Conficker worm (to prevent you from visiting computer security Websites, for instance), it can diagnose the likelihood of your PC being infected.

Of course, you can't check all of your computers with Joe's method. Given that Conficker has network- and USB-spreading capabilities, a lot of PCs will be infected that don't have an Internet connection. And it's always possible that a new strain of Conficker comes out that his page doesn't know about, or that other connectivity problems could give you a false impression of the status of your PC.

Even so, it's genius in that way that the most wonderfully simple things always are. I love it.

Graham Cluley is senior technology consultant at Sophos, and has been working in the computer security field since the early 1990s. When he's not updating his other blog on the Sophos website you can find him on Twitter at @gcluley. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Why AI Will Create Far More Jobs Than It Replaces
John DiLullo, CEO, Lastline,  5/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Talk about vendor lock in...
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11816
PUBLISHED: 2019-05-20
Incorrect access control in the WebUI in OPNsense before version 19.1.8, and pfsense before 2.4.4-p3 allows remote authenticated users to escalate privileges to administrator via a specially crafted request.
CVE-2019-10076
PUBLISHED: 2019-05-20
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
CVE-2019-10077
PUBLISHED: 2019-05-20
A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
CVE-2019-10078
PUBLISHED: 2019-05-20
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.
CVE-2019-12239
PUBLISHED: 2019-05-20
The WP Booking System plugin 1.5.1 for WordPress has no CSRF protection, which allows attackers to reach certain SQL injection issues that require administrative access.