We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Conficker?

By Adrem Siratt
Updated: May 17, 2024
Views: 6,950
Share

Conficker is a computer worm that targeted the Microsoft® Windows® operating system. This worm was first detect in November 2008. It allows its creators to remotely control the user's computer. It is one of the most rapidly spreading worms in the history of the Internet.

There have been several different variants of the Conficker worm. The first variant was able to exploit a security vulnerability in Windows® 2000, Windows® XP, Windows® Vista, Windows® Server 2003, Windows® Server 2008, and a beta release of Windows® Server 2008 R2. Another variant allowed the worm to spread through computers' local area network (LAN) connections through network shares.

The French Navy computer network Intramar became infected with the Conficker worm. The French Navy quickly quarantined the affected systems. This downtime resulted in several grounded aircraft, as their flight plans were unable to be downloaded. Other countries, including the United Kingdom and Germany, reported that some government computers had been found to be infected with the Conficker worm.

As of 2010, this worm has been extremely difficult to eliminate, even though nearly all of the techniques employed by the worm have been used in the past or are well understood by researchers. The combination of techniques employed by the worm has resulted in its difficulty in being eliminated. It is also believed that the creators on this worm are monitoring the attempts made by security technicians and are releasing new variants to close the security vulnerabilities as they become known.

Microsoft® has offered a reward of $250,000 US Dollars (USD) for information that leads to the conviction of any individuals responsible for the creation, distribution, and/or maintenance of the Conficker worm. Many security agencies are dedicated to ensuring that the makers of this worm are brought to justice and that the damages caused by this worm are resolved.

Users who think their computer may have become infected with the Conficker worm should be on the lookout for some of the symptoms. The user may find that accounts on the computer are being locked out without the user's permission. Anti-virus websites or the Windows® Update service may also become unavailable to users whose computer have been infected. Any user who believes his computer may be infected should first run existing anti-virus software. If this does not resolve the issues, the user may have a computer technician work on the computer to determine if it has been infected.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Editors' Picks

Discussion Comments
By jonpurdin — On Jun 06, 2011

It seems that virus creators are getting more and more devious. One scary thing about this virus is that is seems to mutate just like a biological virus to avoid being eradicated. Although it was first detected in almost three years ago it is still estimated to infect millions of PCs worldwide and there are five variants of this virus.

In addition to blocking access to certain sites this virus has also been configured to install programs that can steal your passwords or control your computer. Most home computers are protected from attack by a firewall, but if you have a laptop your laptop could be infected by some variants of Conflicker if you take it to work or school. Then it could generate an attack when you access your home network.

Another way this worm attacks is through an autorun file that executes when a removable USB device connects. One good piece of advice is to be sure your computer is updated with the latest security patches and the latest version of a good antivirus.

Share
https://www.wisegeek.net/what-is-conficker.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.