The April Fool's Virus is the term used generally to refer The Conficker Worm and it supposes to activate itself during the April Fool. However, it seems like it was not activated for unknown reasons. The public generally use the term virus to refer to malware. Technically, a virus is different from a worm.
Computer worm is software that infects your computer from a host within your network and takes control of it. A worm-controlled computer is called a zombie computer and used to do various malicious purposes such as the DDoS attack. A server might crashes due to the infection.
A virus on the other hand is software that can replicate itself and will infect your files depending on the virus type. It can also make your computer to become slow due to the replications that happen in the background. It doesn't need a program to cling on unlike the worm.
As you can see, both are different and act differently. The Conficker Worm is a malicious software that storms the internet today and was detected on November 2008. It has few variations released by the creator in order to close the vulnerabilities.
It's an ongoing war between the anti-malware society and the creator. The researchers found the domain name trafficconverter.biz inside the code after they reverse engineered the worm. It attempted to download the payload from the domain name. But, because the domain was suspended, it cannot do so. However, the website owner said they're not responsible for the worm and they claimed that they can prove it.
The name "Conficker" comes from the re-arrangement of few words from the domain name.
So far, the malicious software has been successful in attacking French Navy and United Kingdom Ministry of Defense computer networks.
Luckily, there are few removal tools available on the internet for free. Try the Microsoft Malicious Removal Tools or you can use third parties Conficker Removal Tool such as McAfee and Symantec.
It is crucial to remember that knowledge about computer security is something that we cannot ignore nowadays and we need to learn it in order to protect our computer and our privacy.
0 comments:
Post a Comment