GreekChat.com Forums

GreekChat.com Forums (https://greekchat.com/gcforums/index.php)
-   Chit Chat (https://greekchat.com/gcforums/forumdisplay.php?f=185)
-   -   Warning to Windows Users: Conficker, IMPORTANT! (https://greekchat.com/gcforums/showthread.php?t=104118)

KSig RC 04-01-2009 01:15 AM

Quote:

Originally Posted by AGDee (Post 1795916)
The problem is, we really don't know what it's going to do. It may end up being no big deal at all, but better safe than sorry, right? The variants have become more and more complex. It's a pretty fascinating worm for us IT geeks. The theories are that it's likely to go after big corporate systems in search of mass numbers of credit card numbers, social security numbers, etc. for financial gain.

Of course it's better to clean it than deal with the consequences, especially for someone like you who is responsible for many idiots' computers - however, the fact that the hole was so easily patched, plus the 'early' activation of signal/ping, indicates that while its delivery and ability to morph (plus the unprecedented ability to move 'laterally' across networked computers) are pretty incredible, the actual threat level is most likely moderate, right?

Besides, Russians are already stealing credit card information with more complex worms . . .

Quote:

Originally Posted by AGDee (Post 1795916)
ETA: For all we know, it's going to send out a pop up that says "April Fools!" :)

This would absolutely be hilarious.

AGDee 04-01-2009 05:47 AM

The latest version of this worm makes it look like a machine has been patched when a scan is run. One would think that Code Red, Blaster and Sasser would have everybody installing security patches regularly in some automated fashion. Microsoft provides free tools for admins to do this easily. There really is no excuse, yet networks like Southwest Airlines and CBS were infected anyway. It's the kind of thing that IT personnel should lose their jobs over because it's a very basic function of IT security and so easy to implement and FREE to implement as far as software solutions. Approving and applying security patches to all of our systems is simply a routine part of my job (including on our Ubuntu Linux and MAC systems because yes, there are security patches for Linux and MACs too!). While my department has a system down, I can't say that for all the departments in my system.

Another fairly unique attribute of this one is the ability to spread through USB flash drives. There are many that can spread through network drives easily, but generally, unless you transferred an infected file onto a USB drive unknowningly, you wouldn't have gotten a virus through the USB drive.

This whole thing has confirmed my decision to get my Masters in IT security. It was like a huge adrenalin rush for me yesterday to double check all of our systems through auditing our security logs to identify which of our systems weren't patched and why (mostly laptops that simply haven't been turned on in in months and months). I believe this is my next niche :)

Unregistered- 04-01-2009 04:09 PM

A friend of mine posted this on Facebook this morning. He's one of the head IT guys at my alma mater. You can use it to see if your PC's been infected:

http://www.hawaii.edu/its/conficker/

I have a Mac at home, but a crappy PC at work. So far, so good.


All times are GMT -4. The time now is 03:27 AM.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.