A Conficker is a kind of worm designed to target Microsoft Windows operating systems. It spreads by copying itself onto removable media and network shares.
The world first encountered the Conficker worm in 2008, where it was able to exploit key vulnerabilities in the Windows OS. The attack affected Windows Vista, Windows 2000, Windows Server 2008, Windows XP, Windows Server 2008 R2 Beta systems, and Windows Server 2003.
How do Conficker worms work?
Conficker worms work to give the attacker remote control of the system. They infect a system and force the servers to receive commands from the attacker. They can also disable security measures and restrict the system from accessing any security-related sites. In addition, Conficker worms install more malware to cause further damage, such as data theft.
Signs of a Conficker worm infection
- You may notice that certain services such as Error Reporting Servers, Windows Defender, and Background Intelligent Transfer Services (BITS) automatic updates get disabled automatically.
- You may also notice congested networks.
- Frequent alerts regarding account lockout policies getting triggered and activated.
- A reduction in domain response time to client requests.
- Inability to access security-related sites and software.
- Antimalware software is permanently disabled.