The Conficker worm has been a hot topic for months as white hats and black hats have struggled to one-up each other. When security teams broke the randomization cypher Conficker uses and were able to predict which websites the program would target and when, Conficker.B retaliated. That version of the malware used a new encryption cypher to hide its target list (this was broken as well), and was cabable of spreading from infected to non-infected systems over office networks, shared folders, or even USB keys.Show's over folks, move along, bring on 2999.
Thursday, April 2, 2009
Conficker update
From Ars Technica:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment