Conficker affected Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems. It then patched the “hole” at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012). Conficker’s logic includes mechanisms to generate lists of new domain names on a daily basis to seek out Internet rendezvous points that the authors use for updates and for command and control of the machines infected. Conficker also uses binary validation …show more content…
Computer-induced failures of U.S. power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption” said ty Deputy Secretary of Defense William Lynn. Admiral Mike McConnell voiced his concerns on how cyber attacks can be used as a weapon of mass destruction. General Staff, Alexander Burutin, voiced his concerns on how cyber attacks can infiltrate military control system, navigation and communication systems and other facilities that control the state’s economy and Armed Forces depend on. Other organaizations can also manipulate Supervisory Control and Data Acquisition (SCADA) systems that regulate pumps, valves, elevators, generators, and other machines. John Markoff reported that There are reports that in 1982 President Ronald Reagan approved the covert introduction of malware into SCADA that resulted in a large-scale explosion and major damage to a Soviet gas pipeline (as cited in Krepinevich, 2012). So it is possible. Aside from its ability to execute massive DDoS attacks, the Conficker botnet could crack sophisticated codes, perhaps enabling its controller to breach, compromise, and even destroy protected databases. By early 2009, Conficker B invaded the United Kingdom’s Defense Ministry. Purpose of Conficker, no one knows. Some speculate that it was created as a proof of concept for a cyber weapon, and that its deployment enabled its master(s) to conduct the equivalent of a field test to confirm that a worm could be embedded and spread quickly, and that even after being detected it could sustain its command and control links despite efforts to break them. Interestingly, other variants of Conficker are still embedded in computers around the world. Bowden reported, “Perhaps even more worrisome is that few cyber experts believe Conficker is the product of a