Conficker Virus: A Case Study

Improved Essays
Conficker, a botnet or virus, affected several Windows operating systems such as Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems which lacked patches and had access to the internet (Krepinevich, 2012; Mills, 2009; Ackerman, 2009). Once it infiltrated an organization’s system, it mended the breach located at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012). In order to propagate to other systems, Conficker created a list of new domain names daily to discover other central domains that the virus’ creator employed to update, control or command the infected machines and signed solely by the creator …show more content…
Some organizations still use outdated machines because they cannot afford to upgrade; it is not in their budget. As a result, they use Microsoft systems listed above which may still be infected with the Conficker virus. Also, this could have resulted due to patches not installed immediately because of a rule which required a 90-day notice sent to the U.S. Food and Drug Administration (FDA) for installation approval (Ackerman, 2009). These extra 90 days could create more havoc to an organization’s system because the corrupted machines may be utilized in an attack such as divulging patient information and corrupt other machines on the same network. For instance, Ackerman (2009) insinuated that infected machines with the Conficker virus could disseminate to Microsoft systems on nearby workstations and other sensitive medical devices associated with patients and the care they …show more content…
The purpose of this technology is for authorized physicians and clinicians to have access remotely to oversee the progress of the patient and alter dosages if necessary such as in insulin pumps. However, according to Levitt Communications (2015), “There is the possibility that hackers could break into IMDs’ communications and either send harmful commands to the devices or steal private patient information. Potential motivations for hacking IMDs include the desire to harm either a specific person or just someone in general”. Also, the Conficker virus may assist hackers to perform fraudulent and theft acts by purloining financial data and other vital information from banks, the stock market or hospital records (Burton, 2015; Weinberger, 2012). Next, both Admiral Mike McConnell and General Staff, Alexander Burutin, were disturbed about warfare and cyberattacks and their effects on the military control system, navigation and communication systems and other facilities that control the state’s economy. Therefore, nukes were investigated to ensure that they were not infected (Burton, 2015). Furthermore, organizations can manipulate Supervisory Control and Data Acquisition (SCADA) systems that regulate pumps, valves, elevators,

Related Documents

  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Mc4 Unit 4 Paper

    • 505 Words
    • 3 Pages

    The Medical Communications for Combat Casualty Care (MC4) program integrates and fields the Army’s capability to digitally capture medical treatment data in operational environments, enhancing the continuity of care, and enabling a comprehensive lifelong electronic medical record for Service members. MC4 contains multiple systems within one system including medical software packages fielded to operational medical forces worldwide. The system is comprised of joint software, commercial, and government products including Theater Medical Information Program-Joint (TMIP-J) and Armed Forces Health Longitudinal Technology Application for the Theatre (AHLTA-T) applications provided by Defense Health Clinical Systems (DHCS). The TMIP-J applications…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Remote access to the UHS FUSION/Cerner Millennium Application Portal is available with the use of Citrix Web-Plugin once the user requests access through the Information Technology department. All passwords created to access the portal, which expires every 90 days, must be strong passwords in order maintain secure and protection from unauthorized access, as well as confidentiality. Since electronic health records are easier to access, making them also easer to exploit, access to patient information is based on criteria that is relevant to an individual’s position. As an additional measure of security, an Information Technology Security Officer conducts audits to the computer system’s activity at Summerlin Hospital Medical Center to check for any signs of abuse of the security policy. Other improved patient information security measures have been bar code technology in order to verify the medication and dosage, as well as warnings that alert healthcare providers about allergies and…

    • 1863 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Healthcare landing page SEO: HIPAA COMPLIANCE - 5 Page title: HIPAA Compliance Endpoint Security How Visibility, Control & Automated Response Helps Healthcare Organizations Compensate for BYOD and IoT security Gaps The rise in IoT, BYOD and mobile devices, has made network endpoints one of the most vulnerable security gaps in most networks. What makes the healthcare industry unique, is its need to secure information while maintaining the delicate balance between patient privacy and the need for readily available information to ensure efficient, accurate diagnosis and treatment.…

    • 370 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As Maxistar Medical Supplies Company develops and extends operations it turns out to be progressively critical to keep IT operations secure while likewise empowering the business to rapidly and adequately address client issues. Amid a late appraisal Maxistar recognized a few changes that should have been be executed to their IT operations to secure their business to adjust to administrative and lawful consistency for the Payment Card Industry (PCI), HIPAA, and NIST 800-53 principles. As a major aspect of this evaluation, a few known dangers were recognized and 5 regions particularly were focused as the start of Maxistar's Security and Compliance program. This record will plot those dangers and the rules for our arrangement to carry Maxistar…

    • 164 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Physical access control, audit review: Unauthorized access to sensitive facilities could occur without challenge, during which time a malicious party may directly connect to the supervisory control and data acquisition (SCADA) system and potentially set up a more permanent and remote connection for ongoing unauthorized access at a later time. Physical access to organizational facilities is a security vulnerability if not control as unauthorized personnel may access critical or sensitive areas. 5. Audit review, analysis and reporting: Without formalized review and validation of logs, unauthorized users, applications, or other unauthorized events may be present in the system and operate in the industrial control systems network without detection. 6.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Nurse executives have the role to ensure the correct stakeholders are at the table when an area that holds so much importance is on the line. The impact an organization could have if subject to a cyber attack on medical records could be devastating not only financially, but also commitment that we have made to protect and advocate for our patient’s. According to Dvorak (2016), everyone should know what the expectations are, whether they’re in the organizations workforce or a business associate. This show the positive impact that nurse executives can have on this topic when they maintain and have the knowledge that is needed to understand new methods of nursing informatics related to patients electronic records and the use of electronic communication for healthcare organizations. Nurse executive must make a commitment to the education of not only potential risk, but also ensuring the proper use of nursing informatics whether related to proper use of email or transmission of electronic health records (EHR) and many other uses of electronic protected health information.…

    • 1241 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays