It attempts to brute-force common accounts with common passwords as a method
of authentication in order to spread. Are you seeing something that you
would consider /unique/ to your domain?

I wasnt aware that it would try to attack unique accounts based on locallly
chached information, but it certainly wouldnt be a far stretch for
what downadup can otherwise do.

--
ME2





On Wed, Feb 23, 2011 at 9:26 AM, James Rankin <[email protected]> wrote:

> Right, for my sins I appear to be stuck in the middle of a Conficker
> outbreak. I'm not here to advise about security, but five minutes into
> outbreak and the glaring hole of Autoplay being enabled is clearly how this
> thing is propagating, and they've been told. Fools - they are in the process
> of learning the hard way.
>
> I avoided Conficker in my last few roles thanks to good security practices,
> there's one question I can't work out from the Conficker write-ups though.
> How does this thing get it's list of accounts to attack? We have accounts
> locking out right left and centre, but they are clearly not just accounts
> that have previously logged on to the local machine. Does anyone know if
> this little beastie queries Active Directory in some way?
>
> TIA,
>
>
>
> JRR
>
> --
> "On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
> the machine wrong figures, will the right answers come out?' I am not able
> rightly to apprehend the kind of confusion of ideas that could provoke such
> a question."
>
> *IMPORTANT: This email is intended for the use of the individual
> addressee(s) named above and may contain information that is confidential,
> privileged or unsuitable for overly sensitive persons with low self-esteem,
> no sense of humour or irrational religious beliefs. If you are not the
> intended recipient, any dissemination, distribution or copying of this email
> is not authorised (either explicitly or implicitly) and constitutes an
> irritating social faux pas.
>
> Unless the word absquatulation has been used in its correct context
> somewhere other than in this warning, it does not have any legal or no
> grammatical use and may be ignored. No animals were harmed in the
> transmission of this email, although the kelpie next door is living on
> borrowed time, let me tell you. Those of you with an overwhelming fear of
> the unknown will be gratified to learn that there is no hidden message
> revealed by reading this warning backwards, so just ignore that Alert Notice
> from Microsoft.
>
> However, by pouring a complete circle of salt around yourself and your
> computer you can ensure that no harm befalls you and your pets. If you have
> received this email in error, please add some nutmeg and egg whites, whisk
> and place in a warm oven for 40 minutes.*
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to