iTnews
  • Home
  • News
  • Technology
  • Security

Conficker E set to become dormant on May 3

By Dan Raywood on Apr 17, 2009 10:08AM

Shavlik Technologies has predicted that the E variant of the Conficker worm will be killed off on the 3rd of May.

Jason Miller, Shavlik's security and data team manager, claimed that Conficker.E has a kill date of May 3 and will cease to be functional from that date, although it is possible that it could be taken over by another botnet controller.

“Although the Conficker.E virus will no longer function after 3rd May, the Conficker.C virus will still remain active on affected systems,” Miller said.


Shavlik's senior vice president of sales and marketing Chris Schwartzbauer claimed that this could be a situation that will unfold over time, and that there is the possibility of it all being a hoax, where ‘someone could be playing chicken with the industry'.


The E variant of Conficker was detected just before the Easter holiday. Rik Ferguson, senior security advisor at Trend Micro, claimed that it is now using a previously established P2P network to contact and network with other infected machines.

Schwartzbauer said: “I do feel nothing may happen, but it is looking like on the 3rd May Conficker may well go dormant, and/or change into something else. Something is going to change this time.

 

“The lesson of Conficker is pretty simple – patch your systems and pay attention to basic configuration settings like passwords. We strongly encourage organisations to be proactive in protecting themselves from Conficker and other malicious viruses by keeping their security up-to-date on an ongoing basis, not just as a reaction to the latest threat to hit the news.”

 
See original article on scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
3confickeremaysecurityvariant

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Dan Raywood
Apr 17 2009
10:08AM
0 Comments

Related Articles

  • Routing security falling short in Australian, New Zealand networks
  • Uber ex-security chief must face fraud charges
  • Crypto crash threatens North Korea's stolen funds
  • Mastercard passes first of three Australian TDIF accreditations
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.