636-680-9359

Are You Patched Against the Conficker.C Virus? Don’t Wait for April 1st to Find Out.

In early March, security researchers identified a new version of the Conficker virus, called Conficker.C. This third variant of the virus, like its predecessors, exploits the vulnerability patched by Microsoft’s security bulletin MS08-067, released in October 2008.

While not currently released, it has been confirmed that this virus will become active and malicious on April 1, 2009.

Conficker.C is a major revision of the original virus. This variant includes new functionality that ranges from new infection methods to disabling security tools. The Conficker.C virus will scan and kill processes for security products including disabling: firewalls, patch deployment, and antivirus software.

WHAT TO DO BEFORE APRIL 1ST:
The best defense is to apply Microsoft Security Bulletin MS08-067 to eliminate the vulnerability. Administrators should ensure every system on their network, internal and external, physical and virtual, has the MS08-067 patch applied. Before trying to clean or detect any systems that may be infected with the Conficker virus, administrators must first apply the patch. Attempting to clean systems without first protecting them will only present a never-ending process of Virus removal. By applying MS08-067, administrators will then be able to start the task of scanning for infected devices and restoring them back to their desired state.

WHAT TO DO AFTER APRIL 1ST:
If you have not installed the MS08-067 patch on all systems before April 1st, and systems are infected, researchers claim that you will not be able to apply the patch to the infected systems. You will have to manually remove the virus and then apply the patch. This can leave your system open for re-attack in the timeframe between removing the virus and applying the patch.

Make sure your computer(s) is/are up-to-date and the patch is installed on all systems. If you need assistance with this, please call our office at (314) 544-0011.

Related Post
Minimizing Ransomware Risk

Ransomware is dominating the headlines so far in 2016. The number and severity of ransomware attacks has been increasing. Recent ransomware attacks against school districts, healthcare providers, state and local governments, and enterprises illustrate that criminals have shifted away from targeting just consumers, and instead are focusing on companies who will pay higher ransoms. Consider the following […]

Read more
Bring Google Fiber to St. Louis

The City of St. Louis has begun it’s bid for Google Fiber! Google is planning to build ultra-high speed broadband networks in a small number of trial locations across the country. The plan is to deploy 1 Gbps, fiber optic connections directly to people’s homes. This connection would be over 100 times faster than what […]

Read more
Change of Scenery: New Kyvon Office

Kyvon has moved! As of March, our office has relocated to our data center space at 710 Tucker Boulevard in downtown St. Louis. Our new location puts us in the heart of the city, just a few blocks from the Arch and the amazing Citygarden. What does this mean to our hosting customers? Our technicians […]

Read more
%d bloggers like this: