![]() The malware circumvented proper authentication to allow the malicious code to download software payloads and spread. The Conficker worm is a malicious code that made use of a software vulnerability in Windows computer network coding. ©Erik Svoboda/ How Does the Conficker Virus Work? ![]() The Conflicker Virus has many different aliases. Some attribute this strange behavior to the hackers not wishing to draw attention. While it is known to be among the most proliferate malicious code in the world, it has not been used by the original authors to do damage to systems. ![]() This has prevented the worm from spreading further, but not before it could spread to millions of computers in over 190 countries including personal, business, and government computers. Since the discovery of the Conficker malware in 2008, Microsoft has patched the vulnerability in MS08-067 in security update 958644. ![]() Using a flaw in the NetBIOS (MS08-067), the Conficker worm gained access to personal computers and servers to begin a heavy dictionary attack to bypass administrator passwords and form a botnet. It was first discovered in November 2008, after it had been spread through the internet by exploiting a vulnerability in-network service on Windows 2000, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 Beta. The Conficker Virus is a type of malware known as a computer worm. What is the Conficker Virus? Computers running an older Windows operating system are more vulnerable to the Conficker Virus. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |