We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:Win32/Dogkild.C
Aliases: TR/Crypt.XPACK.Gen (Avira) Trojan.Downloader.Agent.AAWS (BitDefender) Trojan.KillProc.1565 (Dr.Web) Win32/AutoRun.KillAV.E (ESET) Worm.Win32.AutoRun.bbjs (Kaspersky) W32/Autorun.worm.c (McAfee) W32/Autorun.JSB (Panda) Worm.Win32.AutoRun.tqi (Rising AV) Troj/KillB-Gen (Sophos) Trojan.Killav (Symantec) WORM_AUTORUN.JSE (Trend Micro) Worm.AutoRun.AHNZ (VirusBuster)
Summary
Recovering from recurring infections on a network
-
Ensure that an antivirus product is installed on ALL computers connected to the network that can access or host shares (see above for further detail).
-
Ensure that all available network shares are scanned with an up-to-date antivirus product.
-
Restrict permissions as appropriate for network shares on your network. For more information on simple access control, please see: http://technet.microsoft.com/library/bb456977.aspx.
-
Remove any unnecessary network shares or mapped drives.