Known windows viruses




















Within an hour after its release, Nimda reached the top spot of all reported attacks. No wonder, since the worm used five different transmission routes. The latter helped it spread rapidly and caused huge network outages. The takeaway : be careful when opening strange attachments in a love letter, even if it comes from your love interest.

It sparked at UTC on January 25, , infecting its first server. Once the job was done, Slammer spread rapidly, doubling the number of victims every few seconds, and just ten minutes after it was released in the wild, the number of infected computers grew to 75, Slammer dramatically slowed down worldwide internet traffic, brought down several important systems, caused a huge panic and more than one billion dollars of damage.

The funny thing is, this cybersecurity breach could have easily been prevented. The destructive power of computer viruses can make them weapons of mass digital destruction, and Stuxnet became the first one. Spread via a USB thumb drive, it targeted Siemens industrial control systems, causing centrifuges to mysteriously fail and self-destroy at a record rate.

The engineers did a remarkable job. In , the year it appeared, Stuxnet was believed to be the most sophisticated cyberweapon ever deployed. CryptoLocker is not like a typical computer virus that causes harm and spreads itself. CryptoLocker used a trojan disguised as a PDF file that was spread through email attachments. If there is a flaw in the system, somewhere down the line, it will undoubtedly be exploited.

Conficker, Downup, Downadup, Kido - these are all computer virus names that appeared on the internet in It used the MS Windows system vulnerability and advanced malware techniques to propagate and install itself into the system. These techniques included copying itself to shared folders and exploiting the AutoRun utility for removable media. Despite its wide distribution and the hassle caused to get rid of it, the worm itself did not cause much damage. Get Protected Now. Hackers have been increasingly sending emails that instruct readers to install urgent Windows OS updates.

It encrypts all of your files and programs and demands a ransom payment to un-encrypt the files. This is why you must be using an antivirus that provides proper internet security, protecting you from dangerous emails. This piece of malware is a Trojan — malware disguised as something legitimate — that accesses your sensitive bank account details and steals all of your funds. Instead, Zeus Gameover can bypass centralized servers and create independent servers to send sensitive information.

In essence, you cannot trace your stolen data. People without the knowledge to carry out a sophisticated ransomware attack can pay to hire a professional hacker or team of hackers to perform the attack for them. The growth of the underground RaaS industry is worrying, as it shows how easy it is to infect people with ransomware despite the bad actors having no previous experience with designing or coding malware. Hackers send out emails that are disguised as legitimate information about the outbreak.

Readers are prompted to click a link to learn more about the information, but the link contains malware that copies the files on your device and steals your personal information. Research currently focuses on the spread of this malware in Japan.

Still, it will become an issue worldwide during any kind of newsworthy outbreak. Fleeceware continues to charge app users large amounts of money despite users deleting those apps. And 15 years later, Mydoom, first spotted in that month, still holds the record. Mydoom affected Windows computers and used a backdoor to take control of a PC and subvert Windows Explorer.

It launched a distributed denial of service attack which seemed to particularly target computers belonging to SCO. But avoided hitting email addresses registered to some universities as well as those at Microsoft and Symantec. Well, that was Stuxnet.

It was spread by USB thumb drive and targeted software that controlled a uranium facility in Iran. According to a report in the New York Times, the damage it caused was so great it caused 1, centrifuges to self-destruct. Ransomware has become hugely popular among hackers and cybercriminals for obvious reasons. CryptoLocker was one of the first examples. Released in September , CryptoLocker spread via email attachments and encrypted files on infected computers making them impossible to access.

In order to restore access to their data, users had to pay a ransom, at which point the cybercriminals behind CryptoLocker would send a decryption key that could be used to unencrypt the files. Some users reported that they were able to regain access by carrying out a System Restore or using data recovery software. Others said that when they had tried to recover files, they had lost them completely.

Sasser and Netsky were two different viruses but are often grouped together because they are believed to have been created by the same person. Sasser worked by scanning random IP addresses, connecting to the computers using them via a vulnerable port, and instructing them to download the virus using a buffer overflow in Windows and Windows XP. Netsky was spread by email and enticing recipients to open an attachment. Contents Exit focus mode. Please rate your experience Yes No. Any additional feedback?

Submit and view feedback for This product This page. View all page feedback. In this article.



0コメント

  • 1000 / 1000