This is the Windows Server Update Services support team blog. We cover all things relating to WSUS and Windows Update.
Looks like the MSRC folks have a couple new updates regarding the Conficker worm.
The first is about some updates to the dedicated Conficker site:
I wanted to follow up our recent Conficker post from last Friday where we posted new pages to consolidate our information on Conficker for enterprises and consumers. We’ve also made the easy-to-remember URL www.microsoft.com/conficker available that will take you directly to the Conficker page for enterprises.
You can read more on this at http://blogs.technet.com/msrc/archive/2009/02/12/conficker-domain-information.aspx.
The second is an activity update that provides a quick, high-level overview on what’s been going on:
First, today we’re making public, the work we and many other industry and academic partners have been doing behind the scenes to help combat the Conficker worm.
Second, we’ve provided additional information from our research to our Microsoft Active Protections Program (MAPP) partners and our Microsoft Security Response Alliance (MSRA) partners and posted it to the MSRC weblog in an effort to help customers and other researchers.
Finally, we have announced a US$250,000 reward for information that results in the arrest and conviction of those responsible for illegally launching the Conficker worm. Individuals with information about the Conficker worm are encouraged to contact their international law enforcement agencies. Additionally, Microsoft has implemented an Antivirus Reward Hotline, 1-425-706-1111, and an Antivirus Reward Mailbox, firstname.lastname@example.org, where tips can be shared.
You can read more at http://blogs.technet.com/msrc/archive/2009/02/12/conficker-activity-update.aspx
J.C. Hornbeck | Manageability Knowledge Engineer