Detect Conficker Breed of self-updating and difficult to avoid worm.
The Conficker worm utilizes a variety of attack vectors to transmit and receive payloads, including: software vulnerabilities (e.g. MS08-067), portable media devices (e.g. USB thumb drives and hard drives), as well as leveraging endpoint weaknesses (e.g. weak passwords on network-enabled systems). The Conficker worm will also spawn remote access backdoors on the system and attempt to download additional malware to further infect the host. Retina Community includes vulnerability audits for Conficker.
Operating systems:
Windows 7, Windows Vista, Windows XP, Windows 2003, Windows 2000, Windows Server 2008
Date:
02.04.2013
Related Software