3/31/2009
03:45 PM
George V. Hulme
George V. Hulme
Commentary

Final Hours Remain To Remove Conficker

Whether this worm lives up to some of the hype as the-end-of-the-world-as-we-know-it, or proves to be a minor annoyance -- you're better off getting it off as many systems as possible. These recently updated tools help you to get that done.



Whether this worm lives up to some of the hype as the-end-of-the-world-as-we-know-it, or proves to be a minor annoyance -- you're better off getting it off as many systems as possible. These recently updated tools help you to get that done.Just yesterday, the network mapping tool NMAP was updated, based on research from Tillmann Werner and Felix Leder, that detects systems infected with Conficker. The tool with the update (Nmap 4.85BETA5) is available here.

In addition, the non-project research organization, The Honeynet Project, released a paper that details a number of methods to spot and remove the worm. The tools are free to use, and the software mentioned in the Honeynet Project are free to download.

The paper also delves quite deeply into the domain name registration mechanism of Conficker.C that will kick in on April 1, as well as a study of potential domain collisions that could occur.

The paper, "Know Your Enemy: Containing Conficker," is available here.

 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2020 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service