Conficker - Note To Customers
Conficker - Note To Customers
The following information will give you an overview of the worm, the steps one can take to clean an
infected system, and measures to prevent reinfection.
• Upon detecting this worm, reboot the system to clean memory correctly. May require more than
one reboot.
We have identified thousands of binaries that carry this payload. Depending on the specific variant, the
worm may spread via LAN, WAN, web, or removable drives and by exploiting weak passwords. Conficker
disables several important system services and security products and downloads arbitrary files. Computers
infected with the worm become part of an army of compromised computers and could be used to launch
attacks on web sites, distribute spam, host phishing web sites, or carry out other malicious activities.
Conficker.C is the most recent variant of this worm and is dependent on its predecessors, the .A and .B
variants. Exposure to .C is limited to systems that are still infected with the earlier variants.
Symptoms
• Blocks access to security-related sites
Use anti-malware solutions such as ToPS for Endpoint to clean the infection. Use the behavioral detections
techniques like buffer overflow protection in Host IPS to prevent future infections. This is important
because Conficker can propagate via portable media such as infected USB drives. As the media are
accessed, the system processes autorun.inf and executes the attack. For more information, read McAfee
Avert Labs’ document “Combating Conficker Worm.”
2. Identify systems at risk of infection
You need to identify which systems are at risk. This list includes systems that either are not patched
against Microsoft vulnerability MS08-067 or do not have proactive protection controls to mitigate the
vulnerability. McAfee Vulnerability Manager and ePolicy Orchestrator can identify systems that are
vulnerable and not protected.
By using network IPS in strategic points in your network you can quickly limit the ability of the threat to
spread, allowing time for you to either update your client anti-virus signatures or modify policies to block
the threat using the behavioral controls.
The signature (DAT) files include detection and repair for this worm
Identifies nodes that have not been patched and denies them
McAfee Network Access Control (NAC) access to the network unless they are updated
McAfee, Inc.
3965 Freedom Circle
McAfee and/or additional marks herein are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in
Santa Clara, CA 95054 the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other
888 847 8766 registered and unregistered trademarks herein are the sole property of their respective owners.
www.mcafee.com © 2009 McAfee, Inc. All rights reserved.