BitDefender finds Conficker worm fading from view in 2011 malware landscape

February 2011 Cyber Security

January study sees key changes in prominence of major threats.

BitDefender reports that occurrences of the Conficker worm dropped significantly in January.

BitDefender’s global Top Ten threat report shows that Win32.Worm.Downadup.Gen, as Conficker is known, has dropped from first to third. Most notably, the threat is completely absent from the regional Top Ten for the UK.

Catalin Cosoi, head of online threat labs at BitDefender remarked: “Conficker has been one the most high-profile threats of recent years, with many variants. The damage it can cause varies from exploiting weak passwords to blocking access to security vendor websites.

“However, it seems that a combination of migration away from the Windows XP OS and better awareness amongst users means it is no longer as widespread as it once was. Of course, people still need to remain vigilant and make sure their computers are fully protected to avoid infection.”

The gap created by Conficker has been partly filled by a newcomer - Trojan.Crack.I. This apparently harmless keygen installs a Trojan that collects various details about other applications on the compromised computer, as well as to install a backdoor service that allows remote access to the infected system.

Its emergence on the second place is an indicator of the fact that the worldwide software landscape is affected by piracy and the subsequent threats posed by this practice.

Anyone still concerned about Conficker can download BitDefender’s free removal tool:

For more information contact Alina Anton, BitDefender, +40 212 063 470,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The enemy within – insider ­security threats
May 2019, Wolfpack Information Risk , Editor's Choice, Cyber Security, Financial (Industry)
Insider threats in today’s financial world are insidious and destructive and your defence against insiders should start long before the person assumes his/her position.

LoJax: Be very careful
May 2019 , Cyber Security
Even replacing drives won’t kill this malware, which is still active more than nine months after researchers from Arbor Networks detailed it.

Assessing impacts: The meteors of security and AI
May 2019 , Cyber Security
As security threats evolve and artificial intelligence pervades, what impact are they set to have on business over the next year?

Visibility is key, and lacking
May 2019 , Editor's Choice, Cyber Security
Cybercriminals are most likely to be caught on servers and networks, but detecting their time and point of entry remains a mystery.

The benefits of machine learning and UEBA
May 2019 , Cyber Security
Combining accurate and essential user behavioural data with machine learning allows you to more accurately monitor your users on an endpoint-by-endpoint basis.

Insiders: who are they?
May 2019 , Security Services & Risk Management, Cyber Security
The 2018 Insider Threat Report by Cybersecurity Insiders reports that more than 51% of companies are concerned about unintentional insider attacks.

Securing the Industrial Internet of Things
May 2019, Axiz , Cyber Security, IT infrastructure, Industrial (Industry)
The very benefits that makes the IIoT so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors.

Hybrid cloud and hyper-converged data protection
May 2019 , IT infrastructure, Cyber Security
Arcserve Unified Data Protection extends disaster recovery and backup technologies to prevent downtime and data loss for hyper-converged and SaaS-based workloads.

Vivotek strengthens cybersecurity
May 2019 , CCTV, Surveillance & Remote Monitoring, Cyber Security
Vivotek has announced the availability of comprehensive protection in its Cybersecurity Management Solution under the strategy of its 'Security within Security' campaign.

Scammers target job seekers
May 2019 , Cyber Security
Kaspersky Lab experts detected a blast of sophisticated spam emails in the first quarter of 2019, featuring fake job-offers that seemed to come from HR recruiters in large corporations.