![xp embedded conficker xp embedded conficker](http://securityaffairs.co/wordpress/wp-content/uploads/2016/06/Conficker-2.png)
Potential motivations for hacking IMDs include the desire to harm either a specific person or just someone in general”. However, according to Levitt Communications (2015), “There is the possibility that hackers could break into IMDs’ communications and either send harmful commands to the devices or steal private patient information. For instance, Ackerman (2009) insinuated that infected machines with the Conficker virus could disseminate to Microsoft systems on nearby workstations and other sensitive medical devices associated with patients and the care they …show more content… The purpose of this technology is for authorized physicians and clinicians to have access remotely to oversee the progress of the patient and alter dosages if necessary such as in insulin pumps. These extra 90 days could create more havoc to an organization’s system because the corrupted machines may be utilized in an attack such as divulging patient information and corrupt other machines on the same network. Food and Drug Administration (FDA) for installation approval (Ackerman, 2009). Also, this could have resulted due to patches not installed immediately because of a rule which required a 90-day notice sent to the U.S. As a result, they use Microsoft systems listed above which may still be infected with the Conficker virus.
![xp embedded conficker xp embedded conficker](https://image.slidesharecdn.com/ferhatelmas214805itsetermpaper-111221182158-phpapp01/95/conficker-botnet-4-728.jpg)
XP EMBEDDED CONFICKER UPGRADE
In order to propagate to other systems, Conficker created a list of new domain names daily to discover other central domains that the virus’ creator employed to update, control or command the infected machines and signed solely by the creator …show more content… Some organizations still use outdated machines because they cannot afford to upgrade it is not in their budget. Once it infiltrated an organization’s system, it mended the breach located at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012).
XP EMBEDDED CONFICKER WINDOWS 7
Show More Conficker, a botnet or virus, affected several Windows operating systems such as Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems which lacked patches and had access to the internet (Krepinevich, 2012 Mills, 2009 Ackerman, 2009).