Educause Security Discussion mailing list archives

Re: Conflicker/NMAP


From: Pete Hickey <pete () SHADOWS UOTTAWA CA>
Date: Tue, 31 Mar 2009 10:53:29 -0400

I've used the Python thing and I seem to have had success.  At least the machines
turned up make sense.

I've been regularly monitoring machines scanning on port 445, and have
ASSUMED that these were conficker infected.  They were infected with
something, and were cleaned.... at least in threory.

There were some repeat offenders.  Either the owner didn't know how to clean
them, or they were not patched properly, or something.

Everry machine that my python scanner picked up was one that had been
prreviously identified as infected severtal times (one lab, and about
5 other machines).

WHile I'm fairly confident that it is not returning any false positives, I
am not sure it is detecting everything, as today, after that scan, I
have found several infected-with-something machines scanning on 445.  Yes
it could be something else.  Unfortunately I don't get feedback when
machines are cleaned.

On Tue, Mar 31, 2009 at 09:21:35AM -0500, Consolvo, Corbett D wrote:
I realize many folks may not want to answer this, but has anyone had many positives/infections with the released nmap 
scan for Conflicker?  So far we seem to be coming up clean and many other folks I've talked to or emailed with have 
come up clean as well.  I'm just concerned about the possibility of false negatives.  Of course, the problem may not 
be particularly wide-spread except in the eyes of some media outlets.

Thanks,
Corbett Consolvo
Texas State University

--
Pete Hickey                         There are only two kinds of people who
The University of Ottawa            are really fascinating:
Ottawa, Ontario                     People who know absolutely everything,
Canada                              and people who know absolutely nothing.

Current thread: