We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:Win32/Citeary.D
Aliases: Dropper/Malware.68096.Z (AhnLab) W32/KillAV.AF.gen!Eldorado (Command) Trojan.MulDrop.59624 (Dr.Web) Trojan.Win32.Scar.crgm (Kaspersky) Downloader-BVN (McAfee) TrojanDownloader:Win32/Small.BPQ (other) Obfuscated.FA (Norman) Mal/Geral-A (Sophos) W32.SillyDC (Symantec) WORM_CITEAR.SMT (Trend Micro)
Summary
Recovering from recurring infections on a network
- Ensure that an antivirus product is installed on ALL machines connected to the network that can access or host shares (see above for further detail).
- Ensure that all available network shares are scanned with an up-to-date antivirus product.
- Restrict permissions as appropriate for network shares on your network. For more information on simple access control, please see: http://technet.microsoft.com/library/bb456977.aspx.
- Remove any unnecessary network shares or mapped drives.