Here is an email i got from sonicwall about the conficker virus. Mike Sent from my Verizon Wireless BlackBerry
-----Original Message----- From: "SonicWALL Support" <nore...@messages.sonicwall.com> Date: 1 Apr 2009 19:01:48 To: <m...@mikewohlrab.com> Subject: SonicWALL Service Bulletin-VULNERABILITY ALERT: Conficker Worm April 1, 2009 April 1st Conficker Worm Update From SonicWALL Recent coverage in various media outlets has tracked the news and speculation as to the behavior of the Conficker worm that has infected millions of computers worldwide. Much attention has been focused on what to expect on April 1, 2009 a date programmed into the worm on which it will expand the set of network sites from which it may potentially receive instructions. The Conficker.C worm is the latest variant of the Conficker worm that infects local computers, terminates services, blocks access to numerous security related web sites and has the ability to receive new instructions potentially altering its threat level over time. Conficker.C spreads without human involvement, moving from PC to PC by exploiting a security vulnerability in versions of Microsoft's Windows OS. It is estimated to have infected millions of end users' machines. SonicWALL has monitored the Conficker.C worm as well as earlier variants of the Conficker malcode since late 2008 and has released signatures designed to protect systems behind SonicWALL devices. Specifically, SonicWALL Unified Threat Management Firewalls UTM with activated Gateway Anti-Virus/Intrusion Protection/Anti-Spyware (GAV/IPS/ASW), or the Comprehensive Global Security Suite which includes the above service, block known variants of the Conficker worm from passing through the network gateway. SonicWALL also released signatures designed to protect its Anti-SPAM/Email Security Solutions when the Anti-Virus features of Email Security are activated. As the April 1st trigger passes, SonicWALL is monitoring the behavior of infected systems. Infected systems have contacted new targeted domains but have apparently not yet downloaded new instructions. However, the behavior observed demonstrates that Conficker.C has the potential to transform itself from relatively benign to malicious through this self-updating mechanism, making this worm a serious ongoing threat. Additional information about the Conficker.C worm is available at https://www.mysonicwall.com/SonicAlert/index.asp [https://www.mysonicwall.com/SonicAlert/index.asp] . Recommendations SonicWALL customers should verify they have activated SonicWALL's Gateway Anti-Virus/Intrusion Protections/Anti-Spyware (GAV/IPS/ASW) service across ALL interfaces of all SonicWALL Unified Threat Management Firewalls . Users who utilize SonicWALL's Enforced Anti-Virus Client should validate that they are enforcing SonicWALL Client Anti-Virus compliance. Users of SonicWALL Anti-Spam/Email Security should verify activation of the Anti-Virus capabilities that are part of the 7.0+ releases of the software. All of these services are available through SonicWALL channel partners and through SonicWALL's MySonicWALL website www.mysonicwall.com [http://www.mysonicwall.com/] . Remediation Although SonicWALL blocks variants of the Conficker worm known to us that come through a device with active prevention services, users should also determine whether their computers were infected through other means (such as USB drives) and actively eradicate the worm. Multiple tools are available for detection and for eradication. However, Conficker blocks infected PCs from accessing some antivirus vendors' and Microsoft's Web sites, so victims may not get automatic updates and may not be able to download the Conficker removal tools that those companies have developed. Note: SonicWALL's websites are not currently blocked by Conficker so users can continue to utilize SonicWALL sites for updates and downloading new firmware and functionality. End users can download or update the SonicWALL Enforced Anti-Virus Client to remove the offending malcode from computer systems. A partial list of companies that have remediation tools is as follows: * SonicWALL * Ahn * LabESET * Kaspersky * F-Secure * McAfee * Microsoft * Sophos * Symantec * TrendMicro Users are encouraged to regularly checkwith the SonicWALL SonicAlert web site https://www.mysonicwall.com/SonicAlert/index.asp [https://www.mysonicwall.com/SonicAlert/index.asp] for updates and late breaking news. Related Information North America Support: +1 888.777.1476 International Support: Contact [http://www.sonicwall.com/us/support/contact.html?elq=C8FDA12309F34CA083F7C60B0B054B3A] You are receiving this message because you indicated that you were interested in information about SonicWALL Internet Security Solutions. If you no longer wish to receive future messages and offers from SonicWALL, you can change your newsletter options at the following this link Click here to change your newsletter options [http://now.eloqua.com/cu.asp?s=373&elqc=12&ea=m...@mikewohlrab.com&elq=C8FDA12309F34CA083F7C60B0B054B3A] If you do not want to receive any future communication from SonicWALL, you may remove your email address from our list by going to the following link Click here to be removed from all email lists [http://now.eloqua.com/u.asp?s=373&elq=C8FDA12309F34CA083F7C60B0B054B3A] 2005 SonicWALL, Inc. | 1143 Borregas Ave, Sunnyvale, CA 94089 | www.sonicwall.com [http://www.sonicwall.com/index.html?elq=C8FDA12309F34CA083F7C60B0B054B3A] _______________________________________________ Post Messages to: ProFox@leafe.com Subscription Maintenance: http://leafe.com/mailman/listinfo/profox OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/1956365652-1238627502-cardhu_decombobulator_blackberry.rim.net-15547913...@bxe1015.bisx.prod.on.blackberry ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.