Skip to main content
Skip to main content
Microsoft Security Intelligence
5 entries found.
Updated on Jan 07, 2009

Microsoft security software detects and removes this threat.

This family of worms can disable several important Windows services and security products. They can also download files and run malicious code on your PC if you have file sharing enabled.

Conficker worms infect PCs across a network by exploiting a vulnerability in a Windows system file. This vulnerability is described and fixed in Security Bulletin MS08-067.

Some worms can also spread via removable drives and by using common passwords.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Feb 20, 2009

Windows Defender detects and removes this threat.

This worm spreads by infecting computers on your network, removable drives (such as USB flash drives), and weak passwords.

It disables important system services and security products, such as antimalware or antivirus software.

Alert level: severe
Updated on Feb 02, 2009
WinNT/Conficker is a trojan component of Worm:Win32/Conficker that aids in restarting the TCP/IP service.
 
Microsoft strongly recommends that users apply the update referred to in Security Bulletin MS08-067 immediately.
 
Microsoft also recommends that users ensure that their network passwords are strong to prevent this worm from spreading via weak administrator passwords. More information is available here.
 
Microsoft also recommends that users apply an update that changes the AutoPlay functionality in Windows to prevent this worm from spreading via USB drives. More information is available in the Microsoft Knowledgebase Article KB971029.
Alert level: severe
Updated on Feb 25, 2009
Worm:Win32/Conficker.gen!B is a generic detection for a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled. It may also spread via removable drives, network shares and weak administrator passwords. It disables several important system services and security products.
 
Microsoft strongly recommends that users apply the update referred to in Security Bulletin MS08-067 immediately.
 
Microsoft also recommends that users ensure that their network passwords are strong to prevent this worm from spreading via weak administrator passwords. More information is available here.
 
Microsoft also recommends that users apply an update that changes the AutoPlay functionality in Windows to prevent this worm from spreading via removable drives. More information is available in the Microsoft Knowledgebase Article KB971029.
Alert level: severe
Updated on Jun 14, 2009
Alert level: severe