Saturday, July 11, 2020

Top 10 Most Hazardous Computer Viruses Ever

In this article, we will see some most deadly viruses that may create huge damages to the computer.

1. CryptoLocker. 


CryptoLocker Ransomware was discharged in September 2013 and it spread through email attachments and encrypted the user's files with the goal that they couldn't access them. A virus is a hazardous form of ransomware that encrypts files on the computer. A Victim needs to pay a certain sum through bitcoin in exchange for being ready to access the file or documents. To decode the file, an individual/victim ought to have a private key to unscramble the file. Once the

files are infected, the files are viably lost forever.

2. PlugX 


Plug X malware is a Remote Access Trojan (Rodent) which is otherwise called "Korplug" and it was first discovered in 2012. It fundamentally targets government elements, targets explicit businesses and organizations and it spreads by means of phishing emails, spam campaigns, and lance phishing campaigns.

The attack begins with a phishing email containing a malicious connection, typically, a uniquely made malicious report and adventures a defenselessness in either Adobe Acrobat Reader or Microsoft Word.

PlugX contains backdoor modules to perform the following errands:

  • XPlugDisk – used to copy, move, rename, execute, and delete files.
  • XPlugKeyLogger – used to log keystrokes.
  • XPlugRegedit – used to enumerate, create, delete, and modify registry entries and values.
  • XPlugProcess – used to enumerate processes, get process information, and terminate processes.
  • XPlugNethood – used to enumerate network resources and set TCP connections.
  • XPlugService – used to delete, enumerate, modify, and start services.
  • XPlugShell – used to perform remote shell on the affected system.

3. Zeus Gameover 


Zeus virus is a piece of the "Zeus" group of malware and viruses and it was first discovered in 2011. A virus is a form of malicious software that objectives Microsoft Windows. Spam messages and drive-by downloads are two main methods of infection.

The main motivation behind the Zeus virus is to access the victim's sensitive bank account subtleties and steal the entirety of the victim's assets. The virus can sidestep centralized servers and make independent servers to send sensitive information and a victim can't follow his/her stolen data. Likewise, sometimes, Zeus can download ransomware that encrypts your files and demands money in exchange for unlocking them.

The least complex approach to dispose of the Zeus virus is to utilize antivirus software just as a malware removal tool.

4. Stuxnet 


Stuxnet worm was thought to have been developing since 2005 and it was first uncovered in 2010. It was originally focused on Iran's atomic offices. The worm pulverized various rotators in Iran's Natanz uranium improvement office by causing them to consume themselves out. Based on the log files of Stuxnet, a company called Foolad Method was the main victim.

Stuxnet spread through USB sticks and Microsoft Windows computers. The real objective of the Stuxnet virus is to search for a specific model of Programmable Logic Controller (PLC) which is made by Siemens. These are small industrial control systems running a wide range of automated processes, for example, in substance plants, on factory floors, petroleum refineries and in

atomic force plants. These PLCs are controlled by computers and it is the main objective of the Stuxnet worm.

5. Mydoom 


MyDoom, the primary adaptation of the worm, appeared on January 26, 2004. It spread by means of email and through a distributed network. This virus originated from Russia and is written in the C++ programming language. The virus makes a backdoor in the victim's computer's operating system. On Feb 1, 2004, it made the virus begin a denial of service (DoS) attack and on Feb 12, it stopped distributing itself. Considerably after the virus spread, the backdoors made during the initial infections remained dynamic. MyDoom, as ILOVEYOU, is a record-holder and was the quickest spreading email-based worm ever.

6. Sasser and Netsky 


Sasser and Netsky were made by 17 years of age German named Sven Jaschan.

These two worms carry on in various manners, likenesses in the code drove security specialists to accept they both were the work from a similar individual. The Sasser worm is unstoppable; when the virus infected a computer, it searched for another defenseless system. The virus scans random IP addresses to find expected victims. While the virus did no physical harm, Sasser was liable for DDOS attacks. The virus slows down the Internet and puts a few sites to a total stop. Sasser was so viable it really ground one-third of the post offices in Taiwan to an end, shut down 130 parts of a Finnish bank,

and forced rail and transatlantic flights to be dropped.

Then again, the Netsky virus spreads by means of email and Window networks to insult other computer viruses, for example, Mydoom and Bagel. There are many forms of Netsky, each made by various people. Netsky was really the more popular

virus, and caused a tremendous measure of problems in 2004.

7. CodeRed 


The Code Red worm was discovered by two eEye Digital Security employees Marc Maiffret and Ryan Permeh. They named it "Code Red" since they were drinking Code Red Mountain Dew. The Code Red surfaced in 2001 and the work focused on computers with the Microsoft IIS web server installed by exploiting a cradle overflow problem in the system. When the computer is infected, it will proceed to make a hundred duplicates of itself yet because of a bug in the programming, it will duplicate significantly more and winds up eating a ton of the system's assets. It will then dispatch a denial of service attack on a few IP addresses, celebrated among them was the attack on the White House website. It likewise permits backdoor access to the server, allowing for remote access to the machine.

8. Nimba 


Nimda first appeared on September 18, 2001, and it spread through the Internet quickly. Indeed, it just took 22 minutes from the second Nimda hit the Internet to arrive at the top of the rundown of reported attacks. The main motivation behind the Nimda virus was to bring Internet traffic to a slither. By creating a backdoor in the victim's operating system, it offers access to the attacker to a similar degree of function. Additionally, if the victim was the administrator for the machine, the attacker would have full control.

9. ILOVEYOU 


ILOVEYOU virus originated in the Philippines, started to infect computers on May 5, 2000. The virus spreads by email with the title "ILOVEYOU" and a connection, "LOVE-LETTER-FOR-YOU.txt.vbs" If the connection was opened, a Visual Fundamental content was executed, and the computer was infected. It is considered one of the most destructive computer viruses ever made. It was managed to unleash ruin on computer systems everywhere throughout the world with around $10 billion worth of harms. 10% of the world's computers were accepted to have been infected. It was awful to such an extent that governments and huge companies took their mailing system offline to forestall infection.

10. Melissa 


The Melissa virus was reportedly named by David L. Smith after an extraordinary artist from Florida in 1999. It was an infected word record that when opened would be transferred to 50 top email contacts of the victim. The report would state that is comprised of the password of various port sites that would get the consideration of the victim and would open it getting hacked.

No comments:

Post a Comment

November 27 is Black Friday and November 30 is Cyber ​​Monday

One of the strongest sales campaigns in shops and online sales recently established in Spain is Black Friday and Cyber ​​Monday. A tradition...