How to destroy and prevent Conficker
Conficker is a new kind of computer worm that has been around since the beginning of this year but has quickly spread across a wide range of people, making many people 'stand out'. Below, please introduce to readers how to detect, prevent and destroy this dangerous computer worm.
What is Conficker?
In fact, this dangerous computer worm has been around since the end of last year shortly after Microsoft announced a fix with information about an extremely dangerous security bug that is present in almost every version of Windows. Conficker is a malicious code that takes advantage of this security bug to spread and infect users' PCs.
Microsoft itself, when it released the emergency update that fixed the above error, also warned about the malicious code that attacks Windows errors such as Conficker and recommends that users quickly download and install the fix.
But it seems that the number of users who pay attention to Microsoft's warning is not much. Evidence clearly demonstrates this is the strong outbreak of Conficker in the first months of this year.
The Conficker worm is known by the following specific names: Worm: Win32 / Conficker.A - by the name of Microsoft, Crypt.AVL of AVG, Mal / Conficker-A (Sophos), Trojan.Win32.Pakes.lxf (F-Secure), Trojan.Win32.Pakes.lxf (Kaspersky), W32.Downadup (Symantec), Worm: Win32 / Conficker.B (Microsoft) and Trend Micro's WORM_DOWNAD.A.
The main mode of infection of this computer worm is through USB memory sticks or an infected PC in the network that will automatically infect other PCs on par. Conficker can break into PC because (1) users have downloaded software from unsafe websites on the Internet, (2) users use peer-to-peer file sharing applications and (3) ) The user has access to a website used to spread Conficker worm.
The ultimate goal of the Conficker worm is that the hackers behind it have control of the user's PC. They can remotely tell the user's PC to distribute spam, attack websites, steal data or use phishing .
Conficker can infect any version of Windows Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista, and Windows XP if users have not installed a Microsoft fix.
Identifying signs of infection with Conficker
There are many signs that PC infection is infected with Conficker. Here are some typical signs of PC infection not only the Conficker worm but also other malicious forms that are prevalent on the Internet.
First, users will see a PC pop up with various pop-up ads. Secondly, the web browser appears a lot of strange things that users have never seen and never downloaded the previous installation.
Thirdly, some settings on the system are changed and the user is unaware. For example, the homepage (homepage) of the browser has been changed to another page and cannot be changed again. Fourth, PC is suddenly running much slower than usual.
Secondly Conficker prevents users from accessing certain directories and does not allow access to websites of security companies such as www.symantec.com, www.mcafee.com . On the system. The system automatically appears several tasks to set a scheduled task schedule.
How to kill Conficker
Once the PC has infected the Conficker worm, it can be said that almost disabled antivirus software cannot completely destroy it. That's why security companies have developed standalone antivirus tools specifically for each type of malicious code. To destroy below please introduce readers Conficker removal tool of Symantec security firm - one of the simplest and easiest to use tools.
Step 1 : Please download this tool here . Right-click and select ' Save Link As ' with Firefox and ' Save Target As ' for Internet Explorer. Users should save this file in an easy-to-find location such as the Desktop screen.
Step 2 : Close all running programs, disconnect the Internet connection completely and disable the System Restore feature of the system.
Step 3 : Run the downloaded program above.
Step 4 : After the program finishes running, restart the PC. Users should run the program again to make sure the system is clean.
Step 5 : Download and install MS08-067 security update of Microsoft here . The easiest is to use the Automatic Updates feature of Windows to update.
Self-protection
If you're lucky to not be infected with the Conficker worm, you should also take measures to protect yourself first, not just the Conficker worm, but also other malicious code.
For Conficker worm, users should quickly download and install MS08-067 update soon or so. Ideally, users should turn on Automatic Updates auto-update feature so that Windows automatically downloads and installs all necessary updates.
Besides, users should also use anti-virus programs such as Kaspersky, Symantec Norton . to protect the system. Completely disable Windows AutoRun feature by following this video tutorial .
In addition, users should also apply safe Internet usage measures such as not opening attachments from unknown emails, so it is a habit to scan USB drives when connecting to the system, so use Windows password protection .
You should read it
- 7 things to know to prevent Conficker worm
- Akamai: Conficker worm is still spreading
- Conficker.e started to implement 'money-making mission'
- The third variant of Conficker appears
- Conficker.C 'timer' broke out on April 1
- Conficker's victim has reached 7 million
- Conficker starts firing around the world
- Conficker worm wakes up via peer-to-peer sharing
May be interested
- Conficker worm still silently growsaccording to the conficker worm team wrote on trend micro's security blog, the dangerous computer worm conficker has many new variants.
- Conficker worm 'terrorizes' US Utal Universityofficials at the university of utah (usa) over the weekend said there were a total of more than 700 pcs on the computer network that were infected with conficker.
- Conficker worm still raging in TM Datacenter data centercalled conficker, the type of computer sieves spread across millions of computers around the world and left tremendous consequences.
- 20% of users are still indifferent to Confickersurvey of qualys inc. shows that despite being warned a lot, it seems that businesses are still indifferent to conficker.
- Download SpyBot Search & Destroy 2.8.68.0spybot - search & destroy is a free and powerful anti-spyware tool that helps protect you and your device from online threats.
- New variant of 'extremely toxic' virus appearsjust after microsoft awarded the $ 250,000 prize to those who caught the dispersal of the malicious virus 'conficker', a new variant appeared to be more dangerous.
- Conficker - the culprit of 'spam tsunami'after being successfully upgraded on the night of 9/4, conficker infected pcs became 'spam robot' with the ability to send billions of spam every day.
- China: Millions of computers infected with the Conficker wormaccording to an official report, in 2009, one in four computers in china had a computer infected with the conficker worm.
- Passwords are simply 'fat bait' of Conficker wormaccording to microsoft's microsoft sirv12 security report, 92% of computers are infected with conficker worm because the password is too weak or stolen, and only 8% is due to unpatched vulnerabilities.
- Conficker controls 4% of globally infected PCsibm's security department claims that every 25 domain names used to download malicious data on the internet are under the control of a dangerous computer worm.