Definition - What does Conficker mean?

Conficker is a worm that infects computers running the Windows operating system by using known flaws in Windows. Conficker uses dictionary attacks on administrator passwords to hijack machines and link them to a virtual machine that is remotely controlled by its creator.

Techopedia explains Conficker

Conficker was first detected in November of 2008. It spread so rapidly that it was considered to be the biggest computer worm infection since the SQL Slammer of 2003. Researchers believe that by January 2009, it had affected more than 9 million home, business and government computers in more than 200 countries.

The name Conficker is considered a combination of the words configuration and ficker. An alternate origin suggested by Microsoft analyst Joshua Phillips is that it came from, as a rearrangement of the letters of the domain (even thought the domain name lacks the letter "k"). This site was used by Conficker as a blind drop to download its updates.

There are five variants of Conficker, designated A through E. Each variant is an improvement of the previous one and contains more defense mechanisms against detection.

The first iteration of the worm was propagated via the Internet by exploiting a vulnerability in Windows' network service. The second variant of the virus added the ability to propagate via local area networks, removable storage and network sharing. Subsequent variants have improved the worm’s encryption ability and detection prevention.

Although Conficker's methods are well-known by researchers, its combined use of so many defense methods makes it very difficult to totally eradicate. The constant update of the worm also serves to keep it alive. Every time a fix or cure has been made, its authors have removed the vulnerability against that cure.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.