Follow:

Search the malware encyclopedia

Search term = conficker
Sorted by Relevance | Sort by Date

18 entries found | Page 1 of 2
Search results have been optimized and some results have been removed. View all results.


WinNT/Conficker
Description: WinNT/Conficker is a trojan component of Worm:Win32/Conficker that aids in restarting the TCP/IP service. Microsoft strongly recommends that users apply the update referred to in Security Bulletin MS08-067 immediately. Microsoft also recommends that users ensure that their network passwords are...
Published Date: Apr 11, 2011
Alert level: Severe

Win32/Conficker
Aliases: W32/Conficker.worm (McAfee) , Mal/Conficker-A (Sophos) , Win32/Conficker.A (CA)
Description: Microsoft security software detects and removes this threat. This family of worms can disable several important Windows services and security products. They can also download files and run malicious code on your PC if you have file sharing enabled. Conficker worms infect PCs across a network by...
Published Date: Oct 14, 2014
Alert level: Severe

Worm:Win32/Conficker
Published Date: Jun 14, 2009
Alert level: Severe

Worm:Win32/Conficker.gen!B
Aliases: Win32/Conficker (CA) , W32/Conficker.worm.gen.a (McAfee) , Mal/Conficker-A (Sophos)
Description: Worm:Win32/Conficker.gen!B is a generic detection for a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled. It...
Published Date: May 26, 2010
Alert level: Severe

Worm:Win32/Conficker.gen!A
Aliases: W32/Conficker.worm (McAfee) , Win32/Conficker.A (ESET) , W32/Conficker.E (Norman)
Description: Worm:Win32/Conficker.gen!A is a generic detection for a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled.
Published Date: May 26, 2010
Alert level: Severe

Worm:Win32/Conficker.E
Aliases: W32/Conficker.worm.gen.d (McAfee) , Win32/Conficker.AQ (ESET) , Win32/Conficker.A (CA)
Description: Worm:Win32/Conficker.E is a member of the Win32/Conficker family and was proactively detected when first discovered as Worm:Win32/Conficker.gen!A. Conficker.E acts as an update mechansim for previous variants of Win32/Conficker. This variant deletes its own executable on May 3 2009. Microsoft...
Published Date: Apr 11, 2011
Alert level: Severe

Worm:Win32/Conficker.A
Aliases: W32/Conficker.worm (McAfee) , Win32/Conficker.A (ESET) , W32/Conficker.E (Norman)
Description: Worm:Win32/Conficker.A is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled.  Microsoft strongly recommends...
Published Date: Apr 11, 2011
Alert level: Severe

Worm:Win32/Conficker.E.dll
Aliases: Win32/Conficker.D (other)
Description: Worm:Win32/Conficker.E.dll is a component of the Win32/Conficker family.  It is installed to machines already infected with Conficker.B, .C, or .D variants as an update via Worm:Win32/Conficker.E’s payload.   Microsoft strongly recommends that users apply the update referred to in Security...
Published Date: Apr 11, 2011
Alert level: Severe

Worm:Win32/Conficker.C
Aliases: Conficker B++ (other)
Description: Microsoft security software detects and removes this threat. This worm spreads by infecting computers on your network, removable drives (such as USB flash drives), and weak passwords. It disables important system services and security products, such as antimalware or antivirus software.
Published Date: Oct 07, 2013
Alert level: Severe

Worm:Win32/Conficker.D
Aliases: W32/Conficker.worm.gen.c (McAfee) , Win32/Conficker.X (ESET) , Win32/Conficker.C (CA)
Description: Microsoft security software detects and removes this threat. This worm can stop some security products from working properly, such as your antivirus software. It spreads using peer-to-peer (P2P) connections to infect any PC on your network. It can also infect removable drives (such...
Published Date: Jun 29, 2014
Alert level: Severe



Didn't find what you were looking for? Here are some search tips:
  • Use short queries with the most important words you are looking for, for example search for “Alureon” instead of “How do I remove Alureon from my computer?
  • Use quotation marks (" ") to search for phrases of multiple words, for example "Green AV".
  • Try again, but with slightly different words that might mean something similar
  • Check if you've accidentally misspelled words