
A week after the Conficker.C (Worm) update algorithm became active, infected machines updated themselves to Conficker.E. However, the update came through Peer-to-Peer channels, not through the web control domains!
The new variant is an executable EXE file unlike previous variants that were DLLs. It's also known as WORM_DOWNAD.E (Trend), W32.Downadup.E (Symantec). The new variant has following characteristics:
The infected machines were also instructed via Conficker P2P network to:
SonicWALL UTM research team is monitoring the situation and releasing GAV signatures for Conficker variants as soon as they are discovered. SonicWALL Gateway AntiVirus provides protection against Conficker.E with GAV: Conficker.E (Worm) signature.
Below is the screenshot of the Rogue AV site that was still active at the time of writing this article:
There are over 3 million computers infected with Conficker worm variants. Below are the hits on our generic signature: 
Share This Article

An Article By
An Article By
Security News
Security News