Question:
What time should time should we turn our computer off to not get the Conficker Worm?
♥ LOVEiN LiFE ♥ &l
2009-03-31 12:51:14 UTC
I really dont want it and im pretty sure everyone else doesnt.. So please help!
Ten answers:
roziecakes
2009-03-31 12:59:21 UTC
You will probably not get this virus. It is no different from any other windows virus, and is even being talked about on the news as though it is just one big April Fool's joke. In countries where it's already tomorrow like China they are reporting that there is no damage.



Don't worry about it. If you have good antivirus software you will probably be fine.
?
2016-08-21 22:50:50 UTC
2
K3v0
2009-03-31 12:54:13 UTC
Go to Microsoft's website and do either Windows Update or Microsoft Update and download/install all of the Critical Updates. The patch needed is KB958644. It came out in October 2008. You probably already have it, but just in case, do what I already said up ^. If you have that patch installed and you continue to scan your computer with your antivirus (make sure it is updated), you will be fine.
jt_technical_service
2009-03-31 12:57:50 UTC
Its not a matter of getting the virus its a matter of all the computer who already have the virus. Get your Windows Updates and make sure you turn on the Windows Firewall. Go to http://jttechonline.com/links.html. Click on #1 that should help you out.
Thomas B
2009-03-31 13:20:57 UTC
Microsoft has already remedy this issue back in October if you have installed the security updated issued October 12th, 2008.



An easy test is trying going to any of these sites if you can visit them without any problem, you do not have this virus.



1. http://www.microsoft.com

2. http://www.mcafee.com

3. http://www.norton-online.com/us/



Good Luck!
Christine
2009-03-31 12:55:10 UTC
That won't work, you need to get some virus stuff, shutting if off and turning it on won't work.
Martial H
2009-04-01 12:07:18 UTC
General Methods of propagation:

• Local network

• Mapped network drives





Aliases:

• Symantec: W32.Downadup.B

• Kaspersky: Net-Worm.Win32.Kido.fw

• F-Secure: Worm:W32/Downadup.gen!A

• Sophos: Mal/Conficker-A

• Panda: Trj/Downloader.MDW

• Grisoft: I-Worm/Generic.CJY

• Eset: a variant of Win32/Conficker.AE worm

• Bitdefender: Win32.Worm.Downadup.Gen



Similar detection:

• Worm/Kido





Platforms / OS:

• Windows 95

• Windows 98

• Windows 98 SE

• Windows NT

• Windows ME

• Windows 2000

• Windows XP

• Windows 2003





Side effects:

• Registry modification

• Makes use of software vulnerability

• Third party control



Files It copies itself to the following locations:

• %all shared folders% \RECYCLER\S-%number%\%random character string%.vmx

• %ProgramFiles%\Internet Explorer\%random character string%.dll

• %ProgramFiles%\Movie Maker\%random character string%.dll

• %System%\%random character string%.dll

• %Temp%\%random character string%.dll

• %ALLUSERSPROFILE%\Application Data\%random character string%.dll







The following file is created:



– %all shared folders%\autorun.inf This is a non malicious text file with the following content:

• %random comments%

shellexecute rundll32.exe %paths and filenames of malware copies%,%random character string%

%random comments%



Registry The following registry keys are added in order to load the service after reboot:



– HKLM\SYSTEM\CurrentControlSet\Services\%random words%\

Parameters\

• ServiceDll" = "%paths and filenames of malware copies%"



– HKLM\SYSTEM\CurrentControlSet\Services\%random words%\

• "ImagePath" = %SystemRoot%\system32\svchost.exe -k netsvcs

"Type" = "4"

"Start" = "4"

"ErrorControl" = "4"







The following registry keys are changed:



– [HKLM\SYSTEM\CurrentControlSet\Services\wscsvc]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– [HKLM\SYSTEM\CurrentControlSet\Services\wuauserv]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– [HKLM\SYSTEM\CurrentControlSet\Services\BITS]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– [HKLM\SYSTEM\CurrentControlSet\Services\ERSvc]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced

New value:

• "Hidden"=dword:00000002

"ShowCompColor"=dword:00000001

"HideFileExt"=dword:00000000

"DontPrettyPath"=dword:00000000

"ShowInfoTip"=dword:00000001

"HideIcons"=dword:00000000

"MapNetDrvBtn"=dword:00000000

"WebView"=dword:00000000

"Filter"=dword:00000000

"SuperHidden"=dword:00000000

"SeparateProcess"=dword:00000000



Network Infection In order to ensure its propagation the malware attemps to connect to other machines as described below.





IP address generation:

It creates random IP addresses while it keeps the first three octets from its own address. Afterwards it tries to establish a connection with the created addresses.





Infection process:

It makes the compromised machine download the malware from the infected source computer.

The downloaded file is stored on the compromised machine as: .\RECYCLER\S-%number%\%random character string%.vmx



Hosts – Access to the following domains is effectively blocked:

• ahnlab; arcabit; avast; avg.; avira; avp.; bit9.; ca.; castlecops;

centralcommand; cert.; clamav; comodo; computerassociates; cpsecure;

defender; drweb; emsisoft; esafe; eset; etrust; ewido; f-prot;

f-secure; fortinet; gdata; grisoft; hacksoft; hauri; ikarus; jotti;

k7computing; kaspersky; malware; mcafee; microsoft; nai.;

networkassociates; nod32; norman; norton; panda; pctools; prevx;

quickheal; rising; rootkit; sans.; securecomputing; sophos; spamhaus;

spyware; sunbelt; symantec; threatexpert; trendmicro; vet.; virus;

wilderssecurity; windowsupdate





Miscellaneous Internet connection:

In order to check for its internet connection the following DNS servers are contacted:

• http://www.getmyip.org

• http://www.whatsmyipaddress.com

• http://getmyip.co.uk

• http://checkip.dyndns.org





Checks for an internet connection by contacting the following web sites:

• baidu.com; google.com; yahoo.com; msn.com; ask.com; w3.org; aol.com;

cnn.com; ebay.com; msn.com; myspace.com





File patching:

In order to increase the number of maximum connections it has the capability to modify the tcpip.sys. It may result in a corruption of that file and break network connectivity.



Rootkit Technology It is a malware-specific technology. The malware hides its presence from system utilities, security applications and in the end, from the user.





Method used:
anonymous
2009-03-31 12:55:17 UTC
11:59 pm tonight to be safe. set your calendar
anonymous
2009-03-31 12:55:05 UTC
it won't mater if you have it it will start when you turn on your computer

http://tech.yahoo.com/blogs/null/132464
anonymous
2009-03-31 12:55:00 UTC
it wont save you


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...