We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:Win32/Failnum.A
Aliases: Win32/IMStealer.worm.76288 (AhnLab) Win32.Worm.IMStealer.A (BitDefender) Win32/SillyAutorun.BNZ (CA) Win32/Agent.NGR (ESET) Win32.Worm.IMStealer (Ikarus) IM-Worm.Win32.Agent.pm (Kaspersky) Generic.dx!dls (McAfee) W32/DLoader.SLLF (Norman) W32/IRCBot.CPZ.worm (Panda) Trojan.Adclicker (Symantec)
Summary
Recovering from recurring infections on a network
-
Ensure that an antivirus product is installed on ALL machines connected to the network that can access or host shares (see above for further detail).
-
Ensure that all available network shares are scanned with an up-to-date antivirus product.
-
Restrict permissions as appropriate for network shares on your network. For more information on simple access control, please see: http://technet.microsoft.com/library/bb456977.aspx.
-
Remove any unnecessary network shares or mapped drives.