isothermalsection

Author Topic: Conficker: Microsoft says two basic security steps might have stopped infections  (Read 2637 times)

Offline OhauitiWeather

  • Hero Member
  • *****
  • Posts: 1977
  • Country: nz
  • Karma: 284
  • Gender: Male
    • Ohauiti Weather
If businesses and consumers stuck to security basics, they could have avoided all cases of Conficker worm infection detected on 1.7 million systems by Microsoft researchers in the last half of 2011.
 
According to the latest Microsoft Security Intelligence report, all cases of Conficker infection stemmed from just two attack methods: weak or stolen passwords and exploiting software vulnerabilities for which updates existed.
 
So using strong passwords and boosting password security in combination with promptly patching known vulnerabilities would have gone a long way toward reducing the number of Conficker infections, which rose by more than 500,000 in the fourth quarter of 2011, according to the study.
 
Despite these simple steps, Conficker has remained at the top of the enterprise threat list for the past two and a half years, the study says.
 
In defense of computer owners, the worm often carries key loggers that steal passwords, says Tim Rains, Microsoft's director of trustworthy computing. The report includes a graphic listing some of the passwords that Conficker tries when it's on a machine inside the enterprise trying to get into file shares, and the list is a who's who of weak passwords (11, 22, admin, asdfgh, foofoo, Password).
 
The report has recommendations for businesses trying to battle advanced persistent threats (APT), which it describes as targeted attacks that can use a variety of methods and that are carried out by adversaries who are very determined. That determination and commitment to long-term infiltration are the key features of APTs, Rains says.
 
To fight them requires holistic risk management that includes prevention, but also effective detection. A big-data approach to aggregating network security and traffic data and analyzing it for anomalous behavior increases the chances of noticing malicious activity of stealthy malware, he says.
 
Businesses should also architect their networks in segments designed to contain successful attacks, giving IT security more time to discover them and respond. That response should be well thought out and rehearsed so it can be implemented quickly when the time comes, he says.

Published by Computerworld and written by By Tim Greene | Framingham | Thursday, 26 April, 2012
Link to article:  http://computerworld.co.nz/news.nsf/security/conficker-microsoft-says-two-basic-security-steps-might-have-stopped-infections?opendocument&utm_source=security&utm_medium=email&utm_campaign=security


David Harris
Ohauiti Weather
WH1091 Wireless Weather Station
Ohauiti Weather :: Home  powered by Cumulus MX 3.0.0 b3041
"If it wasn't for the last minute nothing would ever get done"


Share via twitter

xx
Four steps to cyber security

Started by OhauitiWeather

0 Replies
2705 Views
Last post June 13, 2012, 10:02:27 PM
by OhauitiWeather
xx
Microsoft urges IE users to install security tool

Started by iomkiwi

0 Replies
3419 Views
Last post September 18, 2012, 01:08:18 PM
by iomkiwi
xx
Microsoft security patches include fixes for Word, Office, Windows

Started by OhauitiWeather

0 Replies
2638 Views
Last post May 09, 2012, 10:52:55 PM
by OhauitiWeather
clip
World's tallest man may have stopped growing at 8ft 3in !!!!!

Started by JennyLeez

0 Replies
2756 Views
Last post March 14, 2012, 12:25:29 PM
by JennyLeez
thumbup
Cumulus Manuals - Basic Installation Guide

Started by JennyLeez

0 Replies
4547 Views
Last post March 06, 2012, 09:46:41 PM
by JennyLeez