Data from enterprise users of Sophos’s Endpoint Assessment Test, which checks the state of Windows PC patching and anti-virus protection, suggest 11 per cent of users have failed to install the MS08-067 patch that guards against the vulnerability exploited by Conficker. The figures come from scans run since the start of the year.
The latest variant of the worm also attempts to download files associated with the Waledac botnet onto compromised PCs.
click on image above to test your computer for conficker virus
“Imagine a network of spies that has infiltrated a country. And every day, all of the spies are calling in for their instructions on what to do next,” explained Steve Trilling, a Symantec vice president who says the worm is now living on millions of computers, mainly in corporations.
To prevent the virus infects the computer more, do the following:
- Make sure the virus is not active in your computer. How is the relationship with the computer to the network.
- If the relationship after the network decided to virus infection stopped, it means the source of the virus and not from your computer but from a computer in the network.
- Search Conficker source of the virus in the carrier network before mengkoneksikan your computer. Logically, not all computers in the patch-and connected to the network where there is a computer virus that infected Conficker, it will also Conficker infected in a short time. Unless computers are protected by firewalls that protect their ports:
- UDP Port 135, 137, 138 dan 445
- TCP Port 135, 139, 445 dan 593
of his patch, please download at the Microsoft site.
As previously fed, Conficker not only exploits the rift in the security of Windows XP Service Pack 3 and Windows Server 2003 Service Pack 2. But Windows Vista and Windows Server 2008, even the Windows 7 Pre Beta also vulnerable.
View entire article here