07-03-2014 12:27 PM
I thought the real danger from Conficker had past quite a long time ago but it is still out there lurking in businesses waiting to be giving a new lease of life.
Summary: How pathetic is the security in many enterprises? Almost six years since the patch to stop it was issued, Conficker is still one of the most common threats.
"How many of these are still out there? The Conficker Working Group still tracks Conficker traffic. On Tuesday, July 1 they detected 1,148,345 unique IPs, which isn't the same as the number of systems. It could be much larger or smaller, but in any case it's still a big number, certainly in the hundreds of thousands.
If I'm not mistaken, Conficker was the last of the great Windows worms, which underscores the other lesson to learn from this: Enterprise endpoints running modern operating systems (generally Windows 7) don't have much of a malware/vulnerability problem. For many reasons, such as more secure coding practices, automatic updating and better Internet Explorer versions, users really have to try in order to get themselves infected. As XP dies away, most of the malware problem will die with it.
But will it actually die? I would assume that so many users who are still running ancient, vulnerable and infected computers at this date will not stop using them until the system is as dead as the Titanic.
Remember, these systems are in businesses, many with actual IT departments. They are responsible for the problem persisting."
07-03-2014 01:44 PM
Yea so many still never installed the Patch and the Eye Chart is still up and running to check! http://www.confickerworkinggroup.org/infection_tes
Webroot® SecureAnywhere™ Internet Security Complete Beta Tester v22.214.171.124 on my main system Alienware 17R2, Windows 10 Enterprise x64 (Build 10586) & HTC One M8 Android Lollipop 5.0.1 Phone v126.96.36.19900.
08-04-2015 07:47 AM
The following article is a update:
By Jeremy Kirk
In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action.
Conficker's quick spread was so alarming that an organization was formed called the Conficker Working Group that was tasked with stopping the botnet and finding its creators.
Many countries also formed their own groups that worked with Internet service providers to remove infections from users' computers. But seven years later, there are still about 1 million computers around the world infected with the malware despite the years-long cleanup effort.
Researchers in the Netherlands have analyzed those efforts and tried to figure out what went right and wrong in order to guide future botnet-fighting efforts. Their research paper will be presented next week at the 24th USENIX Security Symposium in Washington, D.C.