BitDefender finds Conficker worm fading from view in 2011 malware landscape

February 2011 Cyber Security

January study sees key changes in prominence of major threats.

BitDefender reports that occurrences of the Conficker worm dropped significantly in January.

BitDefender’s global Top Ten threat report shows that Win32.Worm.Downadup.Gen, as Conficker is known, has dropped from first to third. Most notably, the threat is completely absent from the regional Top Ten for the UK.

Catalin Cosoi, head of online threat labs at BitDefender remarked: “Conficker has been one the most high-profile threats of recent years, with many variants. The damage it can cause varies from exploiting weak passwords to blocking access to security vendor websites.

“However, it seems that a combination of migration away from the Windows XP OS and better awareness amongst users means it is no longer as widespread as it once was. Of course, people still need to remain vigilant and make sure their computers are fully protected to avoid infection.”

The gap created by Conficker has been partly filled by a newcomer - Trojan.Crack.I. This apparently harmless keygen installs a Trojan that collects various details about other applications on the compromised computer, as well as to install a backdoor service that allows remote access to the infected system.

Its emergence on the second place is an indicator of the fact that the worldwide software landscape is affected by piracy and the subsequent threats posed by this practice.

Anyone still concerned about Conficker can download BitDefender’s free removal tool:

For more information contact Alina Anton, BitDefender, +40 212 063 470,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The 4th Industrial Revolution
July 2019, Wolfpack Information Risk , Editor's Choice, Cyber Security, Security Services & Risk Management, Industrial (Industry)
Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril.

Four essential cloud security concepts
July 2019 , Cyber Security, IT infrastructure
Security is a critical a component of any cloud environment, but to be effective, it needs to be as agile and dynamic as the cloud infrastructure being protected.

Cyber-attacks target operational technology
July 2019 , Editor's Choice, Cyber Security, Industrial (Industry)
Focus on operational technology security increasing as around 74% of OT organisations come under attack in the past year, finds a new Fortinet report.

Fear of the unknown
July 2019, Kaspersky Lab , Cyber Security, Security Services & Risk Management
Fear of the unknown: while there’s still interest in cryptocurrencies, just 19% locally understand how they work.

New generation password manager
July 2019 , Cyber Security
NordVPN will release two new cybersecurity solutions this year - NordLocker and NordPass.

Industrial cybersecurity delivers ROI
July 2019, Kaspersky Lab , Industrial (Industry), Cyber Security
Industrial company achieves 368% ROI with Kaspersky Industrial CyberSecurity reveals global research and advisory firm.

Change your birthday
July 2019 , Cyber Security
How unique are the PIN codes that we choose to stop cybercriminals from getting into our phones and their eyes onto our most precious accounts?

SA industrial facilities at risk of cyber attacks
July 2019 , Industrial (Industry), Cyber Security
With international analysts warning of a growing risk of cyber war, sabotage and espionage impacting industrial and mining facilities, South African stakeholders must step up their efforts to mitigate risk.

Free asset visibility solution
July 2019 , Cyber Security
Cynet announces the availability of its free Proactive Visibility offering for insights on IT assets and activities to security solution providers, MSSPs and business customers.

Critical vulnerabilities in smart home controller
July 2019, Kaspersky Lab , Home Security, Cyber Security
Kaspersky researchers investigating the control device for an active smart home ecosystem have identified several critical vulnerabilities.