When asked this morning about the likelihood of the Conficker worm setting off a nastysurprise , SearchSecurity.com’s Rob Westervelt noted both the lack of sourcing for the story and the FUD that has surrounded the worm in the media. Citing both and independent security experts, Westervelt suggested that patched, protected systems should have nothing to worry about on Wednesday. Robert McMillan of PC World, for instance, feels that fears of a Conficker meltdown are greatly exaggerated.
What can be done, if you are still worried? Eric Ogren wrote at SearchSecurity.com that the Microsoft Conficker worm offers attack prevention lesson and suggested the standard response to Web security threats: Run AV software and update patches. Microsoft has also provided a resource page for IT administrators, “Help Protect Windows from Conficker.”
Michael Horowitz, over at Computerworld, recommended the following steps to combat the Conficker worm:
Good luck out there. If concerns over the Conficker infection prove justified, it could be an ugly week in the IT world.
UPDATE: Westervelt also reported that the Conficker flaw has yielded a new tool for detection.
“Security researchers have developed a new tool that can scan the company network and remotely detect machines infected with the Conficker worm.
A proof-of-concept scanner was released by the Honeynet Project, a nonprofit security research organization. The tool is also being made available on many network scanning vendor tools: Tenable (Nessus), McAfee/Foundstone, Nmap, nCircle and Qualys.”
You can download the Honeynet Project’s scanning tool from Honeynet.org.