Sister CISA CISSP

Apr 8 2009   1:50PM GMT

What Conficker Tells Us



Posted by: Arian Eigen Heald
Tags:

The latest statistics I’ve read from vendors now say that up to 6% of PCs worldwide are infected by the worm. What is going to happen as a result of this worm is still yet to be determined. The “patch” provided by Microsoft disables autorun so that the worm cannot infect the machine, but that is for only one variant of the worm. Another patch addresses the underlying vulnerability in the server service.

Windows patch MS08-067. What’s wrong with this picture?

The patch was released in October of 2008. The French Navy, British Parliament and the Armed Forces of Germany have all reported outbreaks.

It’s been almost six months since the first patch release from Microsoft. Why isn’t everybody patched?
The fact that so many computers have been infected tells us that patch management and deployment as it is now is not working.

Companies frequently refuse to patch because they “don’t want to break something.” SQL SLammer brought networks down worldwide – what will Conficker do to your network if you aren’t up to date on patches?

1  Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Labnuke99
    Right on target! [A href="http://itknowledgeexchange.techtarget.com/it-trenches/5-things-we-learned-from-the-conficker-non-event/"]5 Things we learned from the Conficker non-event[/A]
    32,960 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: