Whether this worm lives up to some of the hype as the-end-of-the-world-as-we-know-it, or proves to be a minor annoyance -- you're better off getting it off as many systems as possible. These recently updated tools help you to get that done.Just yesterday, the network mapping tool NMAP was updated, based on research from Tillmann Werner and Felix Leder, that detects systems infected with Conficker. The tool with the update (Nmap 4.85BETA5) is available here
In addition, the non-project research organization, The Honeynet Project, released a paper that details a number of methods to spot and remove the worm. The tools are free to use, and the software mentioned in the Honeynet Project are free to download.
The paper also delves quite deeply into the domain name registration mechanism of Conficker.C that will kick in on April 1, as well as a study of potential domain collisions that could occur.
The paper, "Know Your Enemy: Containing Conficker," is available here.
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.Subscribe